Loading...

TECH TALK LIVE 2017 SCHEDULE

Below is our tentative schedule. Please visit regularly, as we are updating with new session information daily.

1:1 Implementation From Birth to Beyond & Everything In-Between

May 2 - 9:00 AM to 10:00 AM
Presenter: Gary Honabach

This presentation will be on the progress Bloomsburg Area School District has made implementing 1:1 in our district. It will discuss the ground up start of the idea, the hurdles we have encountered, the successes we have had, and the planning that went into going 1:1 with Microsoft Surface Pros. Focus will be on steps taken, preparation, policies created, lessons learned, Professional Development, deployment, support, breakage strategies, and much more.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

1:1 Without Limits – Macs, PCs, and BYOD All-In-One

May 3 - 1:00 PM to 2:00 PM
Presenter: Mike Balik

Downingtown Area School District has recently implemented a successful 1:1 deployment for our three high schools different from the traditional one size fits all model. Students were offered the choice between a district-provided Mac laptop, district-provided PC laptop, or BYOD. This presentation will focus on the process used to begin the program, including the collaboration between curriculum, technology, and building staff; presentations and communication with the school board; as well as the technical infrastructure built for successful wireless access and printing from any device. This session is a great resource for any school personnel interested in starting a 1:1 program or looking to do something different with their existing program.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

AppLocker: Stop (Mostly) All the Bad Things

May 3 - 1:00 PM to 2:00 PM
Presenter: Paul Williams

We fight a never ending battle against viruses, malware, and our new favorite - ransomware. Microsoft's AppLocker is one tool that can help us gain an edge. While not foolproof, AppLocker can significantly reduce the time you spend fighting the bad things that attack your systems by restricting applications using a whitelist. This presentation will give you the information you need to start implementing AppLocker in your environment. You will learn what AppLocker is and is not good for, how to quickly get it set up and running, how to implement it with minimal impact to your users, and how to maintain it easily.

Audience Level: Intermediate
Audience Knowledge:
Track: System Administration

Arduinos with a side of Pi: Revolutionize Chromebook Deployment and Follow Me Printing

May 2 - 9:00 AM to 10:00 AM
Presenter: Nathan Byler

Do you have a large Chromebook deployment coming soon? Have you deployed large amounts of Chromebooks in the past? While Chromebooks have dramatically cut 1:1 deployment time down, enrolling the devices in Google Admin is still a manual process. Enter Centipede.
Centipede is a project developed by Amplified Labs that uses an Arduino to enroll the Chromebook without user interaction. In this session, come see the Centipede in action and learn how to make it work in your environment.
As a bonus, this session will also look at how to use a Raspberry Pi as a print release station for PaperCut Follow Me Printing. Currently, the CPAD device retails at $1500 per device. Learn how, for far less, you can make your own print release stations.

Audience Level: All
Audience Knowledge:
Track: System Administration

Best Practices in Network Design & Planning

May 1 - 10:30 AM to 12:00 PM
Presenter: Michael D. Carey

Michael D. Carey, Director of Operations with KINBER, will provide an overview on KINBER's Research & Education Network, PennREN. His discussion will focus on some best practices regarding Optical Solutions, Delivering Services, Monitoring, and Operational Support. Attendees will learn how the network was build, how it has grown through subsequent Network Designs and customer on-boarding, and how the network is supported. Attendees will be able to take some of the best practices discussed and relate them to enhancing their own network.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Building Culture by Padcasting Your School’s Story

May 2 - 10:30 AM to 11:30 AM
Presenter: JR Renna

How do parents, students, the community, and other staff know about the amazing things happening every day in your school if you do not tell their story? This session will tell the story of how Parkland School District utilized the work of Dr. Tony Sinanis from his book "Hacking Leadership" to build transparency and stakeholder investment in their schools. A student tech team led initiative, kids are using Padcasters and working with teachers and administrators to share events on social media. The initiative has created powerfully positive and creative results. Join us to learn how you can bring this back to your own school.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Building Your Blue Team Lab with Free and Inexpensive Tools and Equipment

May 3 - 9:00 AM to 10:00 AM
Presenter: George Frazier

During this session, participants will look at how to build a Blue Team Lab using free and inexpensive tools and equipment. Free and open source software such as VirtualBox, pfSense, and Security Onion can be installed on older hardware with the addition of inexpensive network cards, providing the student or new enterprise defender with a lab environment to better research and develop the skills necessary to create a defensible network and respond to incidents. Foundational security services such as NTP, Syslog, and Netflow installed on Ubuntu will be examined as well.

Audience Level: Novice
Audience Knowledge: Intermediate
Track: Network Administration

Business Intelligence in Office 365

May 1 - 10:30 AM to 12:00 PM
Presenter: Michael Massoom

Many districts have already begun using Office 365 productivity apps for email, file sharing, and collaboration. Power BI and SharePoint are two powerful apps you can add to your arsenal for exploring data and surfacing insights. We will drill down into sample dashboards and discuss ways to integrate source data from Student Information Systems, databases, spreadsheets, cloud services, and more.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Chromebooks at Middle School (Grades 6-8)

May 3 - 9:00 AM to 10:00 AM
Presenter: Randy McNally

This presentation will provide a case study for deploying Chromebooks to all middle school students via a 1:1 in-school program. The Chromebooks are used in all classes. The presentation will go through the steps to set up the distribution and collection of these devices, the maintenance and repair of these devices, and the network and administration of these devices.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Create a Modern Classroom Experience with JamfPro

May 2 - 11:30 AM to 12:00 PM
Presenter: Dustin Elg

Learn how IT teams, instructional technologists, administrators and teachers manage Macs and iPads in the classroom to ensure their Apple programs are a success. With Jamf Pro in hand, automate Mac and iPad deployment, simplify ongoing management and empower your school’s teachers and students with the tools they need to take learning to a whole new level.

Audience Level: All
Audience Knowledge:
Track: System Administration

Cyber Security Considerations

May 2 - 3:30 PM to 4:30 PM
Presenter: Lotsie Wooten

What is your district doing to combat malicious logic? Do you have visibility into your network? How do you combat social engineering strategies on which hackers rely? How proactive should you be and what steps can you take to ensure that your data and systems are protected? Join a discussion with one district that is trying to answer these questions. Hopefully, we can learn some strategies together that we can apply to our district technology and learn about some useful tools that we can deploy in our environments to assist our fight in protecting our digital environments.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Cyber Security Considerations (Repeat Session)

May 3 - 9:00 AM to 10:00 AM
Presenter: Lotsie Wooten

What is your district doing to combat malicious logic? Do you have visibility into your network? How do you combat social engineering strategies on which hackers rely? How proactive should you be and what steps can you take to ensure that your data and systems are protected? Join a discussion with one district that is trying to answer these questions. Hopefully, we can learn some strategies together that we can apply to our district technology and learn about some useful tools that we can deploy in our environments to assist our fight in protecting our digital environments.

Audience Level: Novice
Audience Knowledge: Intermediate
Track: Technology Leadership

Deploying iPad and Mac in Education

May 1 - 1:00 PM to 2:30 PM
Presenter: Apple

Learn about the latest tools from Apple that can help you successfully deploy and manage Apple devices in your institution. Find out how to automate device setup, manage devices over the air, and streamline content distribution with the all-new Apple School Manager.

Audience Level: All
Audience Knowledge:
Track: System Administration

Deploying iPad and Mac in Education

May 2 - 9:00 AM to 10:00 AM
Presenter: Apple

Learn about the latest tools from Apple that can help you successfully deploy and manage Apple devices in your institution. Find out how to automate device setup, manage devices over the air, and streamline content distribution with the all-new Apple School Manager.

Audience Level: All
Audience Knowledge:
Track: Desktop Support

Desktop Support Round Table Discussion

May 2 - 3:30 PM to 4:30 PM
Presenter: Susan Hoffman

From useful tools your district might be using to best practices, come ready to share and discuss all things desktop support.

Audience Level: All
Audience Knowledge:
Track: Desktop Support

Enterprise Mobility & Security

May 2 - 2:00 PM to 3:00 PM
Presenter: Michael Heffley

Pennsylvania k-12 districts have access, through state-wide contracting, to Microsoft’s EM+S suite of solutions supporting 1-to-1 initiatives, BYOD scenarios, enhanced security and Identity Management capabilities such as multi-factor authentication, Single-Sign-On, identity federation, and password self-service, among others. This session provides an overview of the EM+S capabilities your district may already own, and suggests specific low cost, low risk steps that IT Professionals can take to start receiving value from this platform.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Expectations for a Safe and Secure Learning Environment

May 2 - 2:00 PM to 3:00 PM
Presenter: George Lazarou

School districts and higher education institutions must adapt to the changing landscape of technology in education. In this session, Mr. Lazarou will provide actionable approaches to help education stakeholders adopt a security framework, understand the difference between security and compliance, and prioritize investment in IT security to ensure a safe learning environment for students, faculty, and administrators.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

GIT for Non-Developers

May 2 - 3:30 PM to 4:30 PM
Presenter: Mark Sandblade

Git is a powerful free and open source software version control system that many developers use to safely collaborate on the same software project. Git's usefulness is not just limited to developers. Git has many potential uses for IT departments and non-developers. If you have things like network configs, login scripts, powershell, or documentation you need shared, versioned, documented, and backed-up then Git is your tool. Git can speed up your department's workflow, and help your staff learn from each other. This talk is intended for users with no Git experience with an emphasis on using Git for network and systems administration.

Audience Level: Novice
Audience Knowledge: Basic familiarity with command-line shells such as bash, cmd, or powershell is recommended but not necessary.
Track: System Administration

Going Phishing

May 3 - 9:00 AM to 10:00 AM
Presenter: Andrew Sanders

Phishing has been a popular method for attackers to steal information. Learn about various methods used to exploit victims. See how to setup a Phishing server that can be used to simulate a phishing attack. Help your staff avoid becoming victims of phishing scams by educating them.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Herding Cats: A Case Study in Managing a Software Development Project

May 2 - 10:30 AM to 11:30 AM
Presenter: Matthew Kernicky

Using an internal project as an example, the IU13 team will walk through the steps they took to successfully complete a software development project. This session will cover early stages of project conceptualization to production release and sign-off. Project complications, deadline shifts, and missteps will be addressed along with actions taken to mitigate them.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

How to Achieve Both High ROI on your 1:1, as well as Protecting your Students

May 2 - 11:30 AM to 12:00 PM
Presenter: Mike Boggess

Chromebooks make up half of all US classroom devices sold, making them the go-to device for millions of students. But when SSL decryption and multiple policies for students come into play, schools need smart solutions to reach the ultimate end goal: protect students from violence, self-harm and bullying. Lightspeed Systems works with 5,500 districts around the world to solve these challenges everyday. In this session, we’ll discuss how Lightspeed Systems Relay for Chrome can help your team report on Chromebook activity, filter access with granular policies, protect students from harmful online behavior and locate lost devices. Students move around taking their devices home and around school. We’ll show how continuous identity management makes seamless filtering policies and reviewing holistic user activity a breeze. You’ll also learn how the dynamic reporting engine turns mass quantities of traffic data into actionable reports, even SSL traffic decryption. Let’s discuss how to earn the most ROI with your deployment and give you the power to protect.

Audience Level: All
Audience Knowledge:
Track: System Administration

How to Make People Think You Are a Good Systems Admin

May 2 - 10:30 AM to 11:30 AM
Presenter: Brian Steigauf

This presentation will focus on best practices and gotchas for the systems administrator. I have been doing this for 16 years, have performed assessments, and helped in staff transitions for many school districts. Learn from what I've experienced in the trenches and what I've seen deployed to make you a better systems administrator.

Audience Level: All
Audience Knowledge:
Track: System Administration

How to Make People Think You Are a Good Systems Admin (Repeat Session)

May 3 - 9:00 AM to 10:00 AM
Presenter: Brian Steigauf

This presentation will focus on best practices and gotchas for the systems administrator. I have been doing this for 16 years, have performed assessments, and helped in staff transitions for many school districts. Learn from what I've experienced in the trenches and what I've seen deployed to make you a better systems administrator.

Audience Level: All
Audience Knowledge: All
Track: System Administration

How to Manage Chromebooks On or Off Campus – Quickly and Easily

May 3 - 10:30 AM to 11:30 AM
Presenter: Daniel Farina

This session will show participants how easy it is to secure Chromebooks across any school or district, no matter how large or distributed, using ibossConnect for Chromebook and the iboss Secure Web Gateway platform. During this presentation, iboss personnel will show how schools can manage their Chromebook deployment to ensure individualized filtering and reporting across all users, whether they are on- or off-campus, ensuring CIPA compliance, reducing IT resource requirements, and supporting 1:1 programs that enable anytime, anywhere learning.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Implementing Shared iPads

May 3 - 9:00 AM to 10:00 AM
Presenter: Andrew Thumma

This presentation will discuss processes for implementing shared iPads. This will include Apple requirements such as DEP, an overview of settings within Jamf MDM, setting up Apple School Manager, Apple Caching Servers, and the general process of uploading information to the ASM. We will discuss things that we learned from our own implementation that we believe would be beneficial to know and plan for when implementing. There will also be a brief demonstration of enrolling a device into the shared iPad model.

Audience Level: Intermediate
Audience Knowledge: Basic knowledge of iPads Basic knowledge of Mobile Device Management solutions Knowledge of apple concepts such as DEP would be helpful
Track: System Administration

Interconnecting Those Pesky Remote Sites via DMVPN

May 2 - 9:00 AM to 10:00 AM
Presenter: Michael DeBakey

School districts and ESAs in rural geographic regions struggle with secure connectivity in areas with no other options but lower bandwidth DSL or cable modem connections to interconnect school buildings, disaster recovery sites, or administrative facilities. Once a transport infrastructure is installed and provisioned, the problem of WAN connectivity is the next concern. Even if multi-gigabit Ethernet Network Service (ENS) are available to all sites, in some cases the need for end-to-end encryption is also needed. This presentation will cover the basics of building a functioning, scalable IPSec Virtual Private Network using the Cisco DMVPN solution allowing both IPv4 and IPv6 traffic to be tunneled seamlessly across multiple sites. Use of Cisco networking gear in the core, distribution, or edge is not a requirement for this solution to function.

Audience Level: Expert
Audience Knowledge: Experience with Cisco IOS (or an IOS-like platform), IPsec, dynamic routing protocols, and an understanding of IPv4 and IPv6 network design would be useful in order to understand the complexities of this design.
Track: Network Administration

Introducing iOS 10 and MacOS Sierra

May 1 - 2:45 PM to 4:00 PM
Presenter: Apple

Join us to learn how iOS 10 and macOS Sierra give students and teachers powerful new ways to access, collaborate on, and share documents across devices and apps. See how iOS 10 and macOS Sierra give schools more ways to manage content and devices.

Audience Level: All
Audience Knowledge:
Track: Desktop Support

Introducing iOS 10 and MacOS Sierra

May 2 - 10:30 AM to 11:30 AM
Presenter: Apple

Join us to learn how iOS 10 and macOS Sierra give students and teachers powerful new ways to access, collaborate on, and share documents across devices and apps. See how iOS 10 and macOS Sierra give schools more ways to manage content and devices.

Audience Level: All
Audience Knowledge:
Track: Desktop Support

Introduction to Cyber Defense

May 1 - 1:00 PM to 2:30 PM
Presenter: Todd Echterling

This workshop will give attendees exposure to the computer attack and defense tools required to identify vulnerabilities, exploit them to see their full effect on a system, and patch the systems so that they are no longer vulnerable.

Audience Level: All
Audience Knowledge: PLEASE BRING YOUR OWN LAPTOP-dual-core processor, 5 GB free space & 4 GB of RAM. Experience in virtual machines and Linux recommended but not necessary.
Track: System Administration

Introduction to Cyber Defense Continued

May 1 - 2:45 PM to 4:00 PM

This workshop will give attendees exposure to the computer attack and defense tools required to identify vulnerabilities, exploit them to see their full effect on a system, and patch the systems so that they are no longer vulnerable.

Audience Level: All
Audience Knowledge: PLEASE BRING YOUR OWN LAPTOP-dual-core processor, 5 GB free space & 4 GB of RAM. Experience in virtual machines and Linux recommended but not necessary.
Track: System Administration

Introduction to Incident Response

May 2 - 3:30 PM to 4:30 PM
Presenter: George Frazier

It is not a question of if, but a question of when IT leaders, system and network administrators, and enterprise defenders will experience a compromise. The presenter will introduce participants to computer security incident response based on the PICERL model: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. The PICERL model will be examined, along with suggestions and recommendations for implementing each step in the model. In addition, participants will be introduced to the foundational content of an incident response plan manual and various formats for developing incident handling procedures.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Introduction to Incident Response (Repeat Session)

May 3 - 1:00 PM to 2:00 PM
Presenter: George Frazier

It is not a question of if, but a question of when IT leaders, system and network administrators, and enterprise defenders will experience a compromise. The presenter will introduce participants to computer security incident response based on the PICERL model: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. The PICERL model will be examined, along with suggestions and recommendations for implementing each step in the model. In addition, participants will be introduced to the foundational content of an incident response plan manual and various formats for developing incident handling procedures.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Intrusion Detection Leveraging Microsoft Advanced Threat Analytics

May 2 - 2:00 PM to 3:00 PM
Presenter: Mike Shellenberger

Over 60% of all network intrusions are traced back to compromised user credentials. From detecting known malicious attacks to uncovering abnormal activity with machine learning and behavioral analytics, identify advanced persistent threats to your enterprise quickly and take action swiftly with Microsoft Advanced Threat Analytics. Join us and learn how ATA can play a key role in your organizations layered security approach. We will also cover the fundamentals of deployment and how to get started with ATA.

Audience Level: All
Audience Knowledge: Basic network administration and active directory skills.
Track: System Administration

IPv6 Training

May 1 - 10:30 AM to 12:00 PM
Presenter: Brandon Ross

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: Expert
Audience Knowledge: Knowledge Info
Track: Network Administration

IPv6 Training Continued

May 5 - 2:45 PM to 4:00 PM

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: All
Audience Knowledge:
Track: Network Administration

IPv6 Training Continued

May 2 - 9:00 AM to 10:00 AM

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: All
Audience Knowledge:
Track: Network Administration

IPv6 Training Continued

May 2 - 10:30 AM to 11:30 AM

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: All
Audience Knowledge:
Track: Network Administration

IPv6 Training Continued

May 2 - 11:30 AM to 12:30 PM

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: Expert
Audience Knowledge:
Track: Network Administration

IPv6 Training Continued

May 1 - 1:00 PM to 2:30 PM

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Keynote

May 1 - 8:00 AM to 10:00 AM
Presenter: Keren Elazari

Keynote speaker

Audience Level: All
Audience Knowledge:
Track: Keynote

Knowing is Half the Battle – Edge of Network Monitoring and Control

May 3 - 10:30 AM to 11:30 AM
Presenter: Nick Babiak

The age of big data is causing an explosion of new IT deployments, as well as changing the geographical distribution and types of locations where these systems are deployed. The new generation of requirements create new challenges requiring higher visibility, control, and support in data centers, IDF closets, and remote sites. The goal of this presentation is to provide an intelligent view of how your staff can approach monitoring and control of your IT infrastructure. Downingtown School District will provide examples of how they approach their monitoring challenges with hopes of spurring discussion amongst attendees. We look forward to seeing you at our session!

Audience Level: All
Audience Knowledge:
Track: Network Administration

Legal Concerns in a 1:1 Environment

May 2 - 9:00 AM to 10:00 AM
Presenter: Mark Walz

This session is for administrators, business managers, and technology staff, and covers an overview of the various thorny legal issues associated with the deployment of 1:1 devices.  Issues including student liability for damaged technology, the legality of technology and insurance fees, administrator searches of 1:1 devices, device management concerns and the privacy rights of students, 1:1 devices and software for IEP students, and the legal process needed prior to the adoption of new software or apps.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Leveraging Jamf for Personalized iOS Content with eSpark

May 3 - 1:00 PM to 2:00 PM
Presenter: Derek Sweigart

The demand for customized learning is becoming more and more common in the school setting. eSpark is a tool that Pequea Valley uses to customize math instruction for our K12 learners. Come hear about eSpark and how we use Jamf to manage and deploy eSpark content.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Log Analysis for Security

May 2 - 9:00 AM to 10:00 AM
Presenter: Matthew Frederickson

As information technology professionals, security is not something we can ignore—it is something that impacts us every day. For those of us operating in an Active Directory environment, we need to know what information is available to help identify if—and when—we may have been compromised. In response to feedback from last year's presentation, this session will review the information available to monitor and also will show you how to get the information from your servers to a log management system (this is the new part). In addition, you will learn how to setup and configure a Greylog server.

Audience Level: All
Audience Knowledge: Should be familiar with Windows log files
Track: System Administration

Log Analysis for Security Continued

May 2 - 10:30 AM to 11:30 AM

As information technology professionals, security is not something we can ignore—it is something that impacts us every day. For those of us operating in an Active Directory environment, we need to know what information is available to help identify if—and when—we may have been compromised. In response to feedback from last year's presentation, this session will review the information available to monitor and also will show you how to get the information from your servers to a log management system (this is the new part). In addition, you will learn how to setup and configure a Greylog server.

Audience Level: All
Audience Knowledge:
Track: System Administration

Low/No Budget IP Telephony Using FreePBX

May 2 - 11:30 AM to 12:00 PM
Presenter: Jason Carbaugh

Do you need a full-featured telephone system but have no money? This session will explore using FreePBX from Sangoma, which, as the name implies, is totally free. This solution can be run in your existing virtual environment, so there is no hardware to buy. You can use softphone software for no cost, or you can choose to use low-cost IP phones for your end-users. We will explore setup and implementation of this solution, and view a "live" system so you can get an idea of what options it supports.

Audience Level: Intermediate
Audience Knowledge:
Track: System Administration

Low/No Budget IP Telephony Using FreePBX (Repeat Session)

May 3 - 1:00 PM to 2:00 PM
Presenter: Jason Carbaugh

Do you need a full-featured telephone system but have no money? This session will explore using FreePBX from Sangoma, which, as the name implies, is totally free. This solution can be run in your existing virtual environment, so there is no hardware to buy. You can use softphone software for no cost, or you can choose to use low-cost IP phones for your end-users. We will explore setup and implementation of this solution, and view a "live" system so you can get an idea of what options it supports.

Audience Level: Intermediate
Audience Knowledge:
Track: Network Administration

Maximize Your New Microsoft PA EES Agreement

May 3 - 9:00 AM to 10:00 AM
Presenter: Karen Oberly

This session will review the many benefits of the new Microsoft PA EES agreement, as well as include discussion and tips on how to leverage your agreement to maximize the investment. Learn how schools across Pennsylvania are leveraging the licenses and services included in the EES, to not only save money, but increase efficiencies.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Microsoft Azure

May 1 - 1:00 PM to 2:30 PM
Presenter: Michael Heffley

Azure is at the core of Microsoft’s cloud computing strategy. In this interactive presentation we will review the array of capabilities available through Azure. We will call out specific success stories from academia, and we will explore specific ways for IT Professionals to start engaging with the Azure platform.

Topics include
• What is Azure? A whirlwind tour
• Azure Active Directory (cloud IDM)
• Azure Infrastructure as a Service (VM’s, Storage, VNets)
• Getting Started

Audience Level: All
Audience Knowledge:
Track: System Administration

Microsoft Azure Continued

May 1 - 2:45 PM to 4:00 PM
Presenter: Michael Heffley

Azure is at the core of Microsoft’s cloud computing strategy. In this interactive presentation we will review the array of capabilities available through Azure. We will call out specific success stories from academia, and we will explore specific ways for IT Professionals to start engaging with the Azure platform.

Topics include:
• What is Azure? A whirlwind tour
• Azure Active Directory (cloud IDM)
• Azure Infrastructure as a Service (VM’s, Storage, VNets)
• Getting Started

Audience Level: All
Audience Knowledge:
Track: System Administration

My Personal Information is None of Your Business! How to Keep Your Privacy Private in a Public World

May 3 - 1:00 PM to 2:00 PM
Presenter: T.R. Laputka

Is it possible to keep your privacy in today’s always-on, information-demanding, internet-connected world?
Businesses are making a fortune using and selling your personal information, and not paying you a dime for it. Learn how to keep your information away from prying corporations (and hackers!).

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Network Administration Round Table Discussion

May 2 - 3:30 PM to 4:30 PM
Presenter: Roy Hoover

Come discuss ideas to improve management of your network. How do others do it? What tools work well in a K12 environment with limited resources? How do you gain the visibility into the important data points on network performance without being overwhelmed with useless data? Share your stories, successes, and failures.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Next-Gen Cloud-Based Web Filtering & Parental Integration

May 3 - 10:30 AM to 11:30 AM
Presenter: David Huson

This session will focus on exploring an entirely new and different approach to web filtering and student safety online. Securly is 100% cloud-based and a solution for any device, anywhere, with a new approach to student online safety. Learn about how cloud-based filtering works and review 1:1 deployment scenarios. Find out more about cyber bullying and how to better address violent self-harm topics on social media sites and e-mail. We will also dive into our new parent portal and discuss how you can involve parents in your digital citizenship initiatives for online student safety and productivity.

Audience Level: All
Audience Knowledge:
Track: Network Administration

NMap Fundamentals Hands-On Training

May 1 - 1:00 PM to 2:30 PM
Presenter: Mike Williams

Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.

During this hands-on session, a number of features for probing computer networks, including host discovery and service and operating system detection will be examined.

Audience Level: All
Audience Knowledge: Expert
Track: Network Administration

NMap Fundamentals Hands-on Training Continued

May 1 - 1:00 PM to 2:30 PM
Presenter: Mike Williams

Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.

During this hands-on session, a number of features for probing computer networks, including host discovery and service and operating system detection will be examined.

Audience Level: All
Audience Knowledge:
Track: Network Administration

O365 and the Administration of Schools

May 3 - 10:30 AM to 11:30 AM
Presenter: Jill Sitnick

O365 for Education is a rich collection of tools that allow for enhanced collaboration and knowledge sharing for administrators and educational leaders. In this session, we will explore the newest applications added to your O365 portal, how they can be used to increase productivity across your organization, and how to get started.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Online Safety

May 2 - 10:30 AM to 11:30 AM
Presenter: Mark Walz

This session covers the essential lessons that school teachers and administrators should be providing to students about online safety, including sharing personal information, cyber-bullying and online harassment, and the responsible use of social media.  The session also covers precautions school districts should take to prevent inappropriate communications between teachers and students and a discussion of the legal aspects of 1:1 device management software and active monitoring of student Internet use.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

osTicket – Open Source Support Ticketing System

May 2 - 11:30 AM to 12:00 PM
Presenter: Doug Rose

An end user submits a support ticket. It magically gets fixed. The ticket gets closed. What the end user does not know is that it took the IT Staff an hour of Googling to resolve the issue. All it ended up being was one setting that was misconfigured. The help desk may get overlooked sometimes in discussions, meetings, or just simple maintenance, but it is a vital piece to the technology department. It allows your IT staff to work more efficiently on incoming issues and prioritize requests to make sure everyone is happy from the top-down. All past, future, and FAQs can be documented in one location allowing your staff to search through old tickets to find solutions for the new ones. This presentation will focus on the open source platform “osTicket” that is used in our district. It will cover everything from installation and setup to how we use it daily.

Audience Level: All
Audience Knowledge:
Track: Desktop Support

Protecting Powershell Scripts with Version Control

May 3 - 1:00 PM to 2:00 PM
Presenter: Shawn Mellinger

During this session, version control of PowerShell scripts will be discussed from a System Administrator's point of view. Concepts will be discussed and a demo of easy version control will be presented.

Audience Level: All
Audience Knowledge:
Track: System Administration

Providing Self-Service Password Reset for Your District

May 3 - 10:30 AM to 11:30 AM
Presenter: Jeramy Kopacko

Are you in constant battle with your helpdesk tickets? Do you find your IT team consistently resolving the same issues? Join us as we introduce you to a solution to provide your IT service desk with a tool to cut down on user password issues. We will discuss features, benefits, and security for your district.

Audience Level: All
Audience Knowledge:
Track: System Administration

Rapid Prototyping Technology for the Classroom

May 2 - 11:30 AM to 12:00 PM
Presenter: Stephen Peltier

This presentation is an introduction to Rapid Prototyping with examples and expert classroom teachers to aid in explaining the systems and resources. Multiple 3-D printers will be discussed, as well as Laser cutting and engraving, CNC routers, and mills. In addition to the rapid prototyping tools the software used will also be discussed.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Reaching All Learners

May 1 - 10:30 AM to 12:00 PM
Presenter: Apple

Learn how Apple devices are helping students with special needs learn and engage like never before. Come to this session and discover key features built into Apple products for students with special needs. You will see how iPad and Mac offer a rich set of accessibility features that can be customized to help diverse learners succeed.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Replacing QR Codes on Fliers: Exploiting Bystanders’ Trust

May 2 - 11:30 AM to 12:00 PM
Presenter: Aaron Thomas

This talk describes a nontechnical social engineering attack that preys on the user's trust. A QR code on a flier found on a bulletin board surrounded by other fliers should be trustworthy, right? Take down the flier, replace the QR code, put up copies. You will get to learn about how to identify vulnerable bulletin boards, covertly snagging a flier, replacing the flier with a replaced QR code.

Audience Level: All
Audience Knowledge:
Track: Desktop Support

Secondary and Backup Internet Connections

May 2 - 10:30 AM to 11:30 AM
Presenter: Mike Graham

With 1:1 programs on the rise, adding a second Internet connection to your network may be something you are considering for emergencies or for additional bandwidth. Hempfield has used several different methods of integrating a second connection into the network. This session will cover secondary sources of Internet access, funding, methods of implementation, network addressing, routing, and other considerations.

Audience Level: All
Audience Knowledge: A basic understanding of networks, IP addressing, NAT, and routing
Track: Network Administration

Secondary and Backup Internet Connections (Repeat Session)

May 2 - 3:30 PM to 4:30 PM
Presenter: Mike Graham

With 1:1 programs on the rise, adding a second Internet connection to your network may be something you are considering for emergencies or for additional bandwidth. Hempfield has used several different methods of integrating a second connection into the network. This session will cover secondary sources of Internet access, funding, methods of implementation, network addressing, routing, and other considerations.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Securing the Human Follow Up

May 2 - 2:00 PM to 3:00 PM
Presenter: Nancy Morris
Presenter: Tim Laubach

Most school districts and IU’s have invested in security technology, but have failed to address the human element. People are highly insecure and can unknowingly be a target for cyber attackers.

Several years ago, IU 13 presented their plan for educating employees to use technology while ensuring the organization remained compliant. Making users aware that they are targets, and motivating them to change their behaviors has been an ongoing process. In this session, we will review the initial strategies and tools used, as well as introduce staff development activities that were completed in the last 2 years. Data collected to evaluate the success/failure of our program will be shared and discussed.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Security Threat Landscape

May 1 - 10:30 AM to 12:00 PM
Presenter: Darren W. Carroll

Join Darren W. Carroll, Director, Security & Risk Management Practice at SHI to discuss old, current, and new threats affecting organizations today. Darren has over 26 years of experience in the security and risk management field and has a current focus on applicability of actionable threat intelligence against clients’ environments.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Simplify Your Management of Windows, Mac, iOS, ChromeOS & Android Devices Within a Single Platform

May 2 - 2:00 PM to 3:00 PM
Presenter: Rusty Clementoni

PA based Account Manager (Rusty Clementoni) will take you through an overview of how FileWave has been simplifying Endpoint Management throughout Pennsylvania and across the Country. Since 1992, FileWave has lead the marketplace providing education, enterprise, and government institutions around the world with enterprise level, multi-platform systems, and mobile endpoint management software to assist IT teams throughout the lifecycle process of imaging, deployment, management, tracking and maintenance. FileWave’s all-inclusive, highly scalable software solves the many challenges of managing a diverse and growing population of users, devices, and content by ensuring IT teams have a comprehensive solution that supports both client (desktop/laptop) and mobile devices across Windows, Mac, iOS and Android.

Audience Level: All
Audience Knowledge:
Track: System Administration

Spanning-Tree Protocol

May 3 - 1:00 PM to 2:00 PM
Presenter: Frank Olshansky

In this session, we will go in depth into the Spanning Tree Protocol (STP). Topics covered will include: why we need STP, the STP standards, what happens when things go wrong with STP, and best practices to prevent things from going wrong with STP.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Spark Board for Education: Multi-Use Classroom Device

May 3 - 10:30 AM to 11:30 AM
Presenter: John Stearns

The Cisco Spark™ Board is a 3-in-1 team collaboration device for meeting rooms. The Cisco Spark™ Board, like no other, is a new team collaboration device that combines wireless presentation, digital white boarding, and video conferencing. It is fully cloud- and touch-based and designed for rich team collaboration, securely connecting physical and virtual meeting rooms. It resides in physical meeting rooms, but is connected to the Cisco Spark service to facilitate continuous workflow before the meeting starts and even after everyone has left the physical room. Through the Cisco Spark app, team members both in the physical conference room and attending remotely can meet, message, call, and now, white board from anywhere through their Cisco Spark app-enabled device of choice.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Squeezing the Most Out of Your Bandwidth

May 2 - 11:30 AM to 12:00 PM
Presenter: Robert Ogan

Some of us need every drop of bandwidth we can get, others just need to access certain content more efficiently, but we can all benefit from taking a closer look at how we can make our networks run better.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Successful End User Support: Attitude!

May 2 - 9:00 AM to 10:00 AM
Presenter: Susan Hoffman

The past two years I explored ways to make sure technology is working well in your educational setting with special emphasis on communication between technology departments and end users. My three-pronged approach focused on the need for immediate help, the ability to request timely assistance, and the availability of self-help options. This year I will focus in depth on you, your staff, and your attitude toward technology users. Trust me--this is a tricky topic since it forces us to examine how we perform our job both as an individual as well as a department. Topics include tech attitude types, customer service skills, and customer service practices. The goal is to help everyone recognize strengths and weaknesses with the aim to fully utilize the former and work on the latter to make all interactions positive, even on the busiest days. This session is designed to appeal to people working in a help desk capacity, as well as all technology personnel involved in assisting end users on a daily basis. The desire is to share methods that work well providing technology support to faculty, staff, and students in an educational environment.

Audience Level: All
Audience Knowledge:
Track: Desktop Support

System Administration Round Table Discussion

May 2 - 3:30 PM to 4:30 PM
Presenter: Brian Steigauf

Open discussion on topics related to systems administration. This moderated round table discussion will be user-driven and can cover virtualization, storage technologies, and software that may be helpful in the day-to-day K12 operations.

Audience Level: All
Audience Knowledge:
Track: System Administration

System Integration and Management with the Cloud

May 3 - 10:30 AM to 11:30 AM
Presenter: Steve Katsman

This session will examine the challenges an IT administrator faces when more services are provided in the cloud. This includes ways to secure cloud-based email (O365/Gmail) and manage ChromeOS devices, as well as other cloud services currently being used in K12 Education.

Audience Level: All
Audience Knowledge:
Track: Network Administration

Tech Leadership: Attempting Balance…

May 2 - 9:00 AM to 10:00 AM
Presenter: Kent Sweigart
Presenter: Dr. Christopher Harrington

How does a leader of district technology find success? We suggest identifying strategic areas and district goals. Then balancing the wants of people, social and technology trends, school culture, and change itself to meet those goals. Our goal is to facilitate a discussion that will benefit district technology leaders as they navigate the ever-changing world of technology as it pertains to the educational setting.

Audience Level: Intermediate
Audience Knowledge: All may benefit, but those who are in leadership positions in their schools and work directly with district leadership will benefit most.
Track: Technology Leadership

Technology Leadership Round Table Discussion

May 2 - 3:30 PM to 4:30 PM
Presenter: Ashley Heagy
Presenter: Tim Laubach

Current trends, road-blocks, and successes—come prepared to discuss with other technology leaders how decisions are made and implemented, budgeting, staff management, hiring, retention, and other technology leadership related topics.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Today’s Technology Leader: Planning Sustainable Transformation

May 1 - 1:00 PM to 2:30 PM
Presenter: Jeremiah Okal-Frink

Going 1 to 1 is more than the devices, it is about expanding the access that students have to information, collaborative resources, and productive tools. As technology becomes more infused throughout school systems, collaborative decisions between instruction and technology is a strong approach for success with initiatives. Yet in the end, the technology leader is typically the one who must make it all happen. So often, the approach to planning and implementation that technology leaders know (deadlines, specific tasks, step by step implementation) is different than the approach of the instructional departments and building leaders. We will look at: What are the necessary deliverables from the technology department and what tools, resources, and approaches are proving to be successful; Identify what areas of support and planning need to be addressed in front of the initiative that will allow the changes needed to be successful in the long term. We will also discuss how you can support and guide the process so that you remain sane.

Audience Level: All
Audience Knowledge: Be sure to bring a device as this session is interactive.
Track: Technology Leadership

Today’s Technology Leader: Planning Sustainable Transformation Continued

May 1 - 2:45 PM to 4:00 PM
Presenter: Jeremiah Okal-Frink

Going 1 to 1 is more than the devices, it is about expanding the access that students have to information, collaborative resources, and productive tools. As technology becomes more infused throughout school systems, collaborative decisions between instruction and technology is a strong approach for success with initiatives. Yet in the end, the technology leader is typically the one who must make it all happen. So often, the approach to planning and implementation that technology leaders know (deadlines, specific tasks, step by step implementation) is different than the approach of the instructional departments and building leaders. We will look at: What are the necessary deliverables from the technology department and what tools, resources, and approaches are proving to be successful; Identify what areas of support and planning need to be addressed in front of the initiative that will allow the changes needed to be successful in the long term. We will also discuss how you can support and guide the process so that you remain sane.

Audience Level: All
Audience Knowledge: Be sure to bring a device as this session is interactive.​
Track: Technology Leadership

Transforming Teaching and Learning in the Digital Age

May 2 - 2:00 PM to 4:00 PM
Presenter: David Andrade

In this session, we will explore ways to transform teaching and learning. Technology, devices, cloud services, classroom design, and more will be explored as ways to improve teaching and learning with technology. Emphasis will be on the why and how versus the specific technology.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Troubleshooting Software & Tools

May 1 - 10:30 AM to 12:00 PM
Presenter: Brian Steigauf
Presenter: Dave Light

Learn some of the tools and tricks to help you be an effective problem solver for day to day issues that arise. This session will introduce some of the built-in utilities on both Mac OS X and Windows operating systems and how they can be used to help remedy every day computer/network issues. Some third party utilities will be demonstrated, as well.

Audience Level: All
Audience Knowledge:
Track: Desktop Support

Unlock the Key to Repel Ransomware

May 2 - 2:00 PM to 3:00 PM
Presenter: Mark Villinski

Your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be gone forever if you do not pay up. Since many victims are willing to pay the ransom, this type of crypto malware is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.

During this session you will hear from Mark Villinski, Kaspersky Lab, on what they as a security vendor are seeing in this growing area of focus for both security vendors and cybercriminals.
Areas of focus will include: common ransomware scenarios and delivery mechanisms, trends in this growing form of cybercrime, and recommendations to help your organization avoid being a victim.

Audience Level: Intermediate
Audience Knowledge:
Track: Network Administration

VOIP – Enterprise Features on a School Budget

May 3 - 10:30 AM to 11:30 AM
Presenter: Mark Crescenzi

The presenter will compare and contrast enterprise voice systems looking at different pricing models, feature sets, and also various options for connecting to the outside world. He will explain SIP trunks, PRIs and PSTN connections for all to understand the differences. School district usage will be the context for the discussion.

Audience Level: Intermediate
Audience Knowledge:
Track: Network Administration

Web-Based 1:1 Device Management

May 2 - 2:00 PM to 3:00 PM
Presenter: Tim McCleary

Cheltenham School District embarked on their 1:1 program this year. One of the critical needs was to have a simple way to manage the 1:1 devices, assign them to students, and track incidents and repairs. This presentation will cover Manage1to1 and how we are using it to streamline the management of our 1:1 and other devices across the district. Using this system made the process of handing out devices a snap and allows us to quickly see any open incidents/repairs based upon device and/or assigned user.

Audience Level: All
Audience Knowledge:
Track: System Administration

Windows 10 Deployment Master Class

May 1 - 10:30 AM to 12:00 PM
Presenter: Dan Lezoche

Windows 10 is the new gold standard for desktop operating systems in K12. Whether you are looking to upgrade your student or staff fleet, this presentation will guide you through the process and help you and your organization avoid common challenges along the way. The discussion will focus on various tools, methods, and technology discussions necessary to build your custom Windows 10 deployment and maximize time and effort.

Audience Level: All
Audience Knowledge: Knowledge Info
Track: System Administration

Wireshark Hands-On Training

May 1 - 1:00 PM to 2:30 PM
Presenter: Roy Hoover

Use Wireshark to capture and analyze network traffic in a switched Ethernet environment. Participants will learn the basics of packet capture and analysis through each layer of the OSI model relevant to basic networking troubleshooting. The presentation will be lecture and demonstration showing pre-staged capture files, as well as live captures on a private demonstration network. The presenters will also demonstrate methods of capture, including various options available and step through the contents of a capture, identifying and explaining components of the captured data.

Audience Level: All
Audience Knowledge: Knowledge Info
Track: Network Administration

Wireshark Hands-On Training Continued

May 1 - 2:45 PM to 4:00 PM

Use Wireshark to capture and analyze network traffic in a switched Ethernet environment. Participants will learn the basics of packet capture and analysis through each layer of the OSI model relevant to basic networking troubleshooting. The presentation will be lecture and demonstration showing pre-staged capture files, as well as live captures on a private demonstration network. The presenters will also demonstrate methods of capture, including various options available and step through the contents of a capture, identifying and explaining components of the captured data.

Audience Level: All
Audience Knowledge:
Track: Network Administration

CONTACT

Tech Talk Live is the only conference of its kind in the region specifically designed for IT pros in education.


techtalklive@iu13.org
1020 New Holland Avenue, Lancaster, PA 17601

(717) 606-1770