Loading...

Tech Talk Live 2017 Schedule

Below is our tentative schedule. Please visit regularly, as we are updating with new session information daily.

System
Administration
Network
Administration
Desktop
Support
Technology
Leadership
Day 1 Monday, May 1

Welcome Reception & Keynote Address by Keren Elazari, former hacker turned cyber security expert

8:30 AM - 10: 00 AM, Room 106

Morning Break

10:00 AM - 10:30 AM, Morning snacks and coffee will be served

10:30 AM - 12:00 PM

Windows 10 Deployment Master Class

Room 107

Windows 10 is the new gold standard for...

Session Details
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York Windows 10 Deployment Master Class Windows 10 is the new gold standard for... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Windows 10 Deployment Master Class

Presenter: Dan Lezoche
May 1 - 10:30 AM
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York Windows 10 Deployment Master Class Windows 10 is the new gold standard for desktop operating systems in K12. Whether you are looking to upgrade your student or staff fleet, this presentation will guide you through the process and help you and your organization avoid common challenges along the way. The discussion will focus on various tools, methods, and technology discussions necessary to build your custom Windows 10 deployment and maximize time and effort. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Windows 10 is the new gold standard for desktop operating systems in K12. Whether you are looking to upgrade your student or staff fleet, this presentation will guide you through the process and help you and your organization avoid common challenges along the way. The discussion will focus on various tools, methods, and technology discussions necessary to build your custom Windows 10 deployment and maximize time and effort.

Audience Level: All
Audience Knowledge: Knowledge Info
Track: System Administration
IPv6 Training

Room 104

This training will provide attendees with...

Session Details
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York IPv6 Training This training will provide attendees with... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

IPv6 Training

Presenter: Brandon Ross
May 1 - 10:30 AM
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York IPv6 Training This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: Expert
Audience Knowledge: Knowledge Info
Track: Network Administration
Security Threat Landscape

Room 102

Join Darren W. Carroll, Director, Security & Ri..

Session Details
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York Security Threat Landscape Join Darren W. Carroll, Director, Security & Ri.. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Security Threat Landscape

Presenter: Darren W. Carroll
May 1 - 10:30 AM
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York Security Threat Landscape Join Darren W. Carroll, Director, Security & Risk Management Practice at SHI to discuss old, current, and new threats affecting organizations today. Darren has over 26 years of experience in the security and risk management field and has a current focus on applicability of actionable threat intelligence against clients’ environments. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Join Darren W. Carroll, Director, Security & Risk Management Practice at SHI to discuss old, current, and new threats affecting organizations today. Darren has over 26 years of experience in the security and risk management field and has a current focus on applicability of actionable threat intelligence against clients’ environments.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Troubleshooting Software & Tools

Room 103

Learn some of the tools and tricks to help you...

Session Details
2017-05-01 10:30:00 2017-05-09 12:00:00 America/New_York Troubleshooting Software & Tools Learn some of the tools and tricks to help you... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Troubleshooting Software & Tools

Presenter: Brian Steigauf Presenter: Dave Light
May 1 - 10:30 AM
2017-05-01 10:30:00 2017-05-09 12:00:00 America/New_York Troubleshooting Software & Tools Learn some of the tools and tricks to help you be an effective problem solver for day to day issues that arise. This session will introduce some of the built-in utilities on both Mac OS X and Windows operating systems and how they can be used to help remedy every day computer/network issues. Some third party utilities will be demonstrated, as well. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Learn some of the tools and tricks to help you be an effective problem solver for day to day issues that arise. This session will introduce some of the built-in utilities on both Mac OS X and Windows operating systems and how they can be used to help remedy every day computer/network issues. Some third party utilities will be demonstrated, as well.

Audience Level: All
Audience Knowledge:
Track: Desktop Support
Business Intelligence in Office 365

Room 110

Many districts have already begun using Office...

Session Details
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York Business Intelligence in Office 365 Many districts have already begun using Office... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Business Intelligence in Office 365

Presenter: Michael Massoom
May 1 - 10:30 AM
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York Business Intelligence in Office 365 Many districts have already begun using Office 365 productivity apps for email, file sharing, and collaboration. Power BI and SharePoint are two powerful apps you can add to your arsenal for exploring data and surfacing insights. We will drill down into sample dashboards and discuss ways to integrate source data from Student Information Systems, databases, spreadsheets, cloud services, and more.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Many districts have already begun using Office 365 productivity apps for email, file sharing, and collaboration. Power BI and SharePoint are two powerful apps you can add to your arsenal for exploring data and surfacing insights. We will drill down into sample dashboards and discuss ways to integrate source data from Student Information Systems, databases, spreadsheets, cloud services, and more.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Reaching All Learners

Room 111

Learn how Apple devices are helping students wi...

Session Details
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York Reaching All Learners Learn how Apple devices are helping students wi... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Reaching All Learners

Presenter: Apple
May 1 - 10:30 AM
2017-05-01 10:30:00 2017-05-01 12:00:00 America/New_York Reaching All Learners Learn how Apple devices are helping students with special needs learn and engage like never before. Come to this session and discover key features built into Apple products for students with special needs. You will see how iPad and Mac offer a rich set of accessibility features that can be customized to help diverse learners succeed. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Learn how Apple devices are helping students with special needs learn and engage like never before. Come to this session and discover key features built into Apple products for students with special needs. You will see how iPad and Mac offer a rich set of accessibility features that can be customized to help diverse learners succeed.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Lunch

12:00 PM - 1:00 PM, Room 106

1:00 PM - 2:30 PM

Introduction to Cyber Defense

Room 103

This workshop will give attendees exposure to ...

Session Details
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York Introduction to Cyber Defense This workshop will give attendees exposure to ... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Introduction to Cyber Defense

Presenter: Todd Echterling
May 1 - 1:00 PM
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York Introduction to Cyber Defense This workshop will give attendees exposure to the computer attack and defense tools required to identify vulnerabilities, exploit them to see their full effect on a system, and patch the systems so that they are no longer vulnerable. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This workshop will give attendees exposure to the computer attack and defense tools required to identify vulnerabilities, exploit them to see their full effect on a system, and patch the systems so that they are no longer vulnerable.

Audience Level: All
Audience Knowledge: PLEASE BRING YOUR OWN LAPTOP-dual-core processor, 5 GB free space & 4 GB of RAM. Experience in virtual machines and Linux recommended but not necessary.
Track: System Administration
Microsoft Azure

Room 110

Azure is at the core of Microsoft’s cloud...

Session Details
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York Microsoft Azure Azure is at the core of Microsoft’s cloud... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Microsoft Azure

Presenter: Michael Heffley
May 1 - 1:00 PM
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York Microsoft Azure Azure is at the core of Microsoft’s cloud computing strategy. In this interactive presentation we will review the array of capabilities available through Azure. We will call out specific success stories from academia, and we will explore specific ways for IT Professionals to start engaging with the Azure platform.

Topics include
• What is Azure? A whirlwind tour
• Azure Active Directory (cloud IDM)
• Azure Infrastructure as a Service (VM’s, Storage, VNets)
• Getting Started
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Azure is at the core of Microsoft’s cloud computing strategy. In this interactive presentation we will review the array of capabilities available through Azure. We will call out specific success stories from academia, and we will explore specific ways for IT Professionals to start engaging with the Azure platform.

Topics include
• What is Azure? A whirlwind tour
• Azure Active Directory (cloud IDM)
• Azure Infrastructure as a Service (VM’s, Storage, VNets)
• Getting Started

Audience Level: All
Audience Knowledge:
Track: System Administration
Deploying iPad and Mac in Education

Room 111

Learn about the latest tools from Apple that c...

Session Details
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York Deploying iPad and Mac in Education Learn about the latest tools from Apple that c... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Deploying iPad and Mac in Education

Presenter: Apple
May 1 - 1:00 PM
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York Deploying iPad and Mac in Education Learn about the latest tools from Apple that can help you successfully deploy and manage Apple devices in your institution. Find out how to automate device setup, manage devices over the air, and streamline content distribution with the all-new Apple School Manager. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Learn about the latest tools from Apple that can help you successfully deploy and manage Apple devices in your institution. Find out how to automate device setup, manage devices over the air, and streamline content distribution with the all-new Apple School Manager.

Audience Level: All
Audience Knowledge:
Track: System Administration
Wireshark Hands-On Training

Room 101

Use Wireshark to capture and analyze...

Session Details
2017-05-01 13:00:00 2017-05-27 14:30:00 America/New_York Wireshark Hands-On Training Use Wireshark to capture and analyze... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Wireshark Hands-On Training

Presenter: Roy Hoover
May 1 - 1:00 PM
2017-05-01 13:00:00 2017-05-27 14:30:00 America/New_York Wireshark Hands-On Training Use Wireshark to capture and analyze network traffic in a switched Ethernet environment. Participants will learn the basics of packet capture and analysis through each layer of the OSI model relevant to basic networking troubleshooting. The presentation will be lecture and demonstration showing pre-staged capture files, as well as live captures on a private demonstration network. The presenters will also demonstrate methods of capture, including various options available and step through the contents of a capture, identifying and explaining components of the captured data.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Use Wireshark to capture and analyze network traffic in a switched Ethernet environment. Participants will learn the basics of packet capture and analysis through each layer of the OSI model relevant to basic networking troubleshooting. The presentation will be lecture and demonstration showing pre-staged capture files, as well as live captures on a private demonstration network. The presenters will also demonstrate methods of capture, including various options available and step through the contents of a capture, identifying and explaining components of the captured data.

Audience Level: All
Audience Knowledge: Knowledge Info
Track: Network Administration
NMap Fundamentals Hands-On Training

Room 102

Nmap (Network Mapper) is a security scanner...

Session Details
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York NMap Fundamentals Hands-On Training Nmap (Network Mapper) is a security scanner... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

NMap Fundamentals Hands-On Training

Presenter: Mike Williams
May 1 - 1:00 PM
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York NMap Fundamentals Hands-On Training Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.

During this hands-on session, a number of features for probing computer networks, including host discovery and service and operating system detection will be examined.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.

During this hands-on session, a number of features for probing computer networks, including host discovery and service and operating system detection will be examined.

Audience Level: All
Audience Knowledge: Expert
Track: Network Administration
IPv6 Training Continued

Room 104

This training will provide attendees with...

Session Details
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York IPv6 Training Continued This training will provide attendees with... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

IPv6 Training Continued

May 1 - 1:00 PM
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York IPv6 Training Continued This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Today’s Technology Leader: Planning Sustainable Transformation

Room 107

Going 1 to 1 is more than the devices, it is...

Session Details
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York Today’s Technology Leader: Planning Sustainable Transformation Going 1 to 1 is more than the devices, it is... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Today’s Technology Leader: Planning Sustainable Transformation

Presenter: Jeremiah Okal-Frink
May 1 - 1:00 PM
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York Today’s Technology Leader: Planning Sustainable Transformation Going 1 to 1 is more than the devices, it is about expanding the access that students have to information, collaborative resources, and productive tools. As technology becomes more infused throughout school systems, collaborative decisions between instruction and technology is a strong approach for success with initiatives. Yet in the end, the technology leader is typically the one who must make it all happen. So often, the approach to planning and implementation that technology leaders know (deadlines, specific tasks, step by step implementation) is different than the approach of the instructional departments and building leaders. We will look at: What are the necessary deliverables from the technology department and what tools, resources, and approaches are proving to be successful; Identify what areas of support and planning need to be addressed in front of the initiative that will allow the changes needed to be successful in the long term. We will also discuss how you can support and guide the process so that you remain sane. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Going 1 to 1 is more than the devices, it is about expanding the access that students have to information, collaborative resources, and productive tools. As technology becomes more infused throughout school systems, collaborative decisions between instruction and technology is a strong approach for success with initiatives. Yet in the end, the technology leader is typically the one who must make it all happen. So often, the approach to planning and implementation that technology leaders know (deadlines, specific tasks, step by step implementation) is different than the approach of the instructional departments and building leaders. We will look at: What are the necessary deliverables from the technology department and what tools, resources, and approaches are proving to be successful; Identify what areas of support and planning need to be addressed in front of the initiative that will allow the changes needed to be successful in the long term. We will also discuss how you can support and guide the process so that you remain sane.

Audience Level: All
Audience Knowledge: Be sure to bring a device as this session is interactive.
Track: Technology Leadership

Afternoon Break

2:30 PM - 2:45 PM, Candy Table

2:45 PM - 4:00 PM

Introduction to Cyber Defense Continued

Room 103

This workshop will give attendees exposure...

Session Details
2017-05-01 14:45:00 2017-05-01 16:00:00 America/New_York Introduction to Cyber Defense Continued This workshop will give attendees exposure... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Introduction to Cyber Defense Continued

May 1 - 2:45 PM
2017-05-01 14:45:00 2017-05-01 16:00:00 America/New_York Introduction to Cyber Defense Continued This workshop will give attendees exposure to the computer attack and defense tools required to identify vulnerabilities, exploit them to see their full effect on a system, and patch the systems so that they are no longer vulnerable. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This workshop will give attendees exposure to the computer attack and defense tools required to identify vulnerabilities, exploit them to see their full effect on a system, and patch the systems so that they are no longer vulnerable.

Audience Level: All
Audience Knowledge: PLEASE BRING YOUR OWN LAPTOP-dual-core processor, 5 GB free space & 4 GB of RAM. Experience in virtual machines and Linux recommended but not necessary.
Track: System Administration
Microsoft Azure Continued

Room 110

Azure is at the core of Microsoft’s cloud...

Session Details
2017-05-01 14:45:00 2017-05-31 16:00:00 America/New_York Microsoft Azure Continued Azure is at the core of Microsoft’s cloud... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Microsoft Azure Continued

Presenter: Michael Heffley
May 1 - 2:45 PM
2017-05-01 14:45:00 2017-05-31 16:00:00 America/New_York Microsoft Azure Continued Azure is at the core of Microsoft’s cloud computing strategy. In this interactive presentation we will review the array of capabilities available through Azure. We will call out specific success stories from academia, and we will explore specific ways for IT Professionals to start engaging with the Azure platform.

Topics include:
• What is Azure? A whirlwind tour
• Azure Active Directory (cloud IDM)
• Azure Infrastructure as a Service (VM’s, Storage, VNets)
• Getting Started
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Azure is at the core of Microsoft’s cloud computing strategy. In this interactive presentation we will review the array of capabilities available through Azure. We will call out specific success stories from academia, and we will explore specific ways for IT Professionals to start engaging with the Azure platform.

Topics include:
• What is Azure? A whirlwind tour
• Azure Active Directory (cloud IDM)
• Azure Infrastructure as a Service (VM’s, Storage, VNets)
• Getting Started

Audience Level: All
Audience Knowledge:
Track: System Administration
NMap Fundamentals Hands-on Training Continued

Room 102

Nmap (Network Mapper) is a security scanner...

Session Details
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York NMap Fundamentals Hands-on Training Continued Nmap (Network Mapper) is a security scanner... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

NMap Fundamentals Hands-on Training Continued

Presenter: Mike Williams
May 1 - 1:00 PM
2017-05-01 13:00:00 2017-05-01 14:30:00 America/New_York NMap Fundamentals Hands-on Training Continued Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.

During this hands-on session, a number of features for probing computer networks, including host discovery and service and operating system detection will be examined.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.

During this hands-on session, a number of features for probing computer networks, including host discovery and service and operating system detection will be examined.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Wireshark Hands-On Training Continued

Room 101

Use Wireshark to capture and analyze...

Session Details
2017-05-01 14:45:00 2017-05-01 16:00:00 America/New_York Wireshark Hands-On Training Continued Use Wireshark to capture and analyze... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Wireshark Hands-On Training Continued

May 1 - 2:45 PM
2017-05-01 14:45:00 2017-05-01 16:00:00 America/New_York Wireshark Hands-On Training Continued Use Wireshark to capture and analyze network traffic in a switched Ethernet environment. Participants will learn the basics of packet capture and analysis through each layer of the OSI model relevant to basic networking troubleshooting. The presentation will be lecture and demonstration showing pre-staged capture files, as well as live captures on a private demonstration network. The presenters will also demonstrate methods of capture, including various options available and step through the contents of a capture, identifying and explaining components of the captured data. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Use Wireshark to capture and analyze network traffic in a switched Ethernet environment. Participants will learn the basics of packet capture and analysis through each layer of the OSI model relevant to basic networking troubleshooting. The presentation will be lecture and demonstration showing pre-staged capture files, as well as live captures on a private demonstration network. The presenters will also demonstrate methods of capture, including various options available and step through the contents of a capture, identifying and explaining components of the captured data.

Audience Level: All
Audience Knowledge:
Track: Network Administration
IPv6 Training Continued

Room 104

This training will provide attendees with...

Session Details
2017-05-05 14:45:00 2017-05-01 16:00:00 America/New_York IPv6 Training Continued This training will provide attendees with... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

IPv6 Training Continued

May 5 - 2:45 PM
2017-05-05 14:45:00 2017-05-01 16:00:00 America/New_York IPv6 Training Continued This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Introducing iOS 10 and MacOS Sierra

Room 111

Join us to learn how iOS 10 and macOS Sierra g...

Session Details
2017-05-01 14:45:00 2017-05-01 16:00:00 America/New_York Introducing iOS 10 and MacOS Sierra Join us to learn how iOS 10 and macOS Sierra g... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Introducing iOS 10 and MacOS Sierra

Presenter: Apple
May 1 - 2:45 PM
2017-05-01 14:45:00 2017-05-01 16:00:00 America/New_York Introducing iOS 10 and MacOS Sierra Join us to learn how iOS 10 and macOS Sierra give students and teachers powerful new ways to access, collaborate on, and share documents across devices and apps. See how iOS 10 and macOS Sierra give schools more ways to manage content and devices. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Join us to learn how iOS 10 and macOS Sierra give students and teachers powerful new ways to access, collaborate on, and share documents across devices and apps. See how iOS 10 and macOS Sierra give schools more ways to manage content and devices.

Audience Level: All
Audience Knowledge:
Track: Desktop Support
Today’s Technology Leader: Planning Sustainable Transformation Continued

Room 107

Going 1 to 1 is more than the devices, it is...

Session Details
2017-05-01 14:45:00 2017-05-01 16:00:00 America/New_York Today’s Technology Leader: Planning Sustainable Transformation Continued Going 1 to 1 is more than the devices, it is... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Today’s Technology Leader: Planning Sustainable Transformation Continued

Presenter: Jeremiah Okal-Frink
May 1 - 2:45 PM
2017-05-01 14:45:00 2017-05-01 16:00:00 America/New_York Today’s Technology Leader: Planning Sustainable Transformation Continued Going 1 to 1 is more than the devices, it is about expanding the access that students have to information, collaborative resources, and productive tools. As technology becomes more infused throughout school systems, collaborative decisions between instruction and technology is a strong approach for success with initiatives. Yet in the end, the technology leader is typically the one who must make it all happen. So often, the approach to planning and implementation that technology leaders know (deadlines, specific tasks, step by step implementation) is different than the approach of the instructional departments and building leaders. We will look at: What are the necessary deliverables from the technology department and what tools, resources, and approaches are proving to be successful; Identify what areas of support and planning need to be addressed in front of the initiative that will allow the changes needed to be successful in the long term. We will also discuss how you can support and guide the process so that you remain sane.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Going 1 to 1 is more than the devices, it is about expanding the access that students have to information, collaborative resources, and productive tools. As technology becomes more infused throughout school systems, collaborative decisions between instruction and technology is a strong approach for success with initiatives. Yet in the end, the technology leader is typically the one who must make it all happen. So often, the approach to planning and implementation that technology leaders know (deadlines, specific tasks, step by step implementation) is different than the approach of the instructional departments and building leaders. We will look at: What are the necessary deliverables from the technology department and what tools, resources, and approaches are proving to be successful; Identify what areas of support and planning need to be addressed in front of the initiative that will allow the changes needed to be successful in the long term. We will also discuss how you can support and guide the process so that you remain sane.

Audience Level: All
Audience Knowledge: Be sure to bring a device as this session is interactive.​
Track: Technology Leadership

Evening Event

4:00 PM - 6:00 PM, Distinctive Affairs

Systems
Administration
Network
Administration
Desktop
Support
Technology
Leadership
Day 2 Tuesday, May 2

9:00 AM - 10:00 AM

Log Analysis for Security

Room 110

As information technology professionals...

Session Details
2017-05-02 09:00:00 2017-05-12 10:00:00 America/New_York Log Analysis for Security As information technology professionals... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Log Analysis for Security

Presenter: Matthew Frederickson
May 2 - 9:00 AM
2017-05-02 09:00:00 2017-05-12 10:00:00 America/New_York Log Analysis for Security As information technology professionals, security is not something we can ignore—it is something that impacts us every day. For those of us operating in an Active Directory environment, we need to know what information is available to help identify if—and when—we may have been compromised. In response to feedback from last year's presentation, this session will review the information available to monitor and also will show you how to get the information from your servers to a log management system (this is the new part). In addition, you will learn how to setup and configure a Greylog server. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

As information technology professionals, security is not something we can ignore—it is something that impacts us every day. For those of us operating in an Active Directory environment, we need to know what information is available to help identify if—and when—we may have been compromised. In response to feedback from last year's presentation, this session will review the information available to monitor and also will show you how to get the information from your servers to a log management system (this is the new part). In addition, you will learn how to setup and configure a Greylog server.

Audience Level: All
Audience Knowledge: Should be familiar with Windows log files
Track: System Administration
Web-Based 1:1 Device Management

Room 111

Cheltenham School District embarked on their...

Session Details
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Web-Based 1:1 Device Management Cheltenham School District embarked on their... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Web-Based 1:1 Device Management

Presenter: Tim McCleary
May 2 - 9:00 AM
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Web-Based 1:1 Device Management Cheltenham School District embarked on their 1:1 program this year. One of the critical needs was to have a simple way to manage the 1:1 devices, assign them to students, and track incidents and repairs. This presentation will cover Manage1to1 and how we are using it to streamline the management of our 1:1 and other devices across the district. Using this system made the process of handing out devices a snap and allows us to quickly see any open incidents/repairs based upon device and/or assigned user. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Cheltenham School District embarked on their 1:1 program this year. One of the critical needs was to have a simple way to manage the 1:1 devices, assign them to students, and track incidents and repairs. This presentation will cover Manage1to1 and how we are using it to streamline the management of our 1:1 and other devices across the district. Using this system made the process of handing out devices a snap and allows us to quickly see any open incidents/repairs based upon device and/or assigned user.

Audience Level: All
Audience Knowledge:
Track: System Administration
Interconnecting Those Pesky Remote Sites via DMVPN

Room 103

School districts and ESAs in rural geographic...

Session Details
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Interconnecting Those Pesky Remote Sites via DMVPN School districts and ESAs in rural geographic... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Interconnecting Those Pesky Remote Sites via DMVPN

Presenter: Michael DeBakey
May 2 - 9:00 AM
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Interconnecting Those Pesky Remote Sites via DMVPN School districts and ESAs in rural geographic regions struggle with secure connectivity in areas with no other options but lower bandwidth DSL or cable modem connections to interconnect school buildings, disaster recovery sites, or administrative facilities. Once a transport infrastructure is installed and provisioned, the problem of WAN connectivity is the next concern. Even if multi-gigabit Ethernet Network Service (ENS) are available to all sites, in some cases the need for end-to-end encryption is also needed. This presentation will cover the basics of building a functioning, scalable IPSec Virtual Private Network using the Cisco DMVPN solution allowing both IPv4 and IPv6 traffic to be tunneled seamlessly across multiple sites. Use of Cisco networking gear in the core, distribution, or edge is not a requirement for this solution to function. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

School districts and ESAs in rural geographic regions struggle with secure connectivity in areas with no other options but lower bandwidth DSL or cable modem connections to interconnect school buildings, disaster recovery sites, or administrative facilities. Once a transport infrastructure is installed and provisioned, the problem of WAN connectivity is the next concern. Even if multi-gigabit Ethernet Network Service (ENS) are available to all sites, in some cases the need for end-to-end encryption is also needed. This presentation will cover the basics of building a functioning, scalable IPSec Virtual Private Network using the Cisco DMVPN solution allowing both IPv4 and IPv6 traffic to be tunneled seamlessly across multiple sites. Use of Cisco networking gear in the core, distribution, or edge is not a requirement for this solution to function.

Audience Level: Expert
Audience Knowledge: Experience with Cisco IOS (or an IOS-like platform), IPsec, dynamic routing protocols, and an understanding of IPv4 and IPv6 network design would be useful in order to understand the complexities of this design.
Track: Network Administration
IPv6 Training Continued

Room 104

This training will provide attendees with...

Session Details
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York IPv6 Training Continued This training will provide attendees with... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

IPv6 Training Continued

May 2 - 9:00 AM
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York IPv6 Training Continued This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Successful End User Support: Attitude!

Room 101

The past two years I explored ways to make sure...

Session Details
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Successful End User Support: Attitude! The past two years I explored ways to make sure... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Successful End User Support: Attitude!

Presenter: Susan Koetzle Hoffman
May 2 - 9:00 AM
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Successful End User Support: Attitude! The past two years I explored ways to make sure technology is working well in your educational setting with special emphasis on communication between technology departments and end users. My three-pronged approach focused on the need for immediate help, the ability to request timely assistance, and the availability of self-help options. This year I will focus in depth on you, your staff, and your attitude toward technology users. Trust me--this is a tricky topic since it forces us to examine how we perform our job both as an individual as well as a department. Topics include tech attitude types, customer service skills, and customer service practices. The goal is to help everyone recognize strengths and weaknesses with the aim to fully utilize the former and work on the latter to make all interactions positive, even on the busiest days. This session is designed to appeal to people working in a help desk capacity, as well as all technology personnel involved in assisting end users on a daily basis. The desire is to share methods that work well providing technology support to faculty, staff, and students in an educational environment. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

The past two years I explored ways to make sure technology is working well in your educational setting with special emphasis on communication between technology departments and end users. My three-pronged approach focused on the need for immediate help, the ability to request timely assistance, and the availability of self-help options. This year I will focus in depth on you, your staff, and your attitude toward technology users. Trust me--this is a tricky topic since it forces us to examine how we perform our job both as an individual as well as a department. Topics include tech attitude types, customer service skills, and customer service practices. The goal is to help everyone recognize strengths and weaknesses with the aim to fully utilize the former and work on the latter to make all interactions positive, even on the busiest days. This session is designed to appeal to people working in a help desk capacity, as well as all technology personnel involved in assisting end users on a daily basis. The desire is to share methods that work well providing technology support to faculty, staff, and students in an educational environment.

Audience Level: All
Audience Knowledge:
Track: Desktop Support
Deploying iPad and Mac in Education

Room 105

Learn about the latest tools from Apple that ca...

Session Details
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Deploying iPad and Mac in Education Learn about the latest tools from Apple that ca... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Deploying iPad and Mac in Education

Presenter: Apple
May 2 - 9:00 AM
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Deploying iPad and Mac in Education Learn about the latest tools from Apple that can help you successfully deploy and manage Apple devices in your institution. Find out how to automate device setup, manage devices over the air, and streamline content distribution with the all-new Apple School Manager. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Learn about the latest tools from Apple that can help you successfully deploy and manage Apple devices in your institution. Find out how to automate device setup, manage devices over the air, and streamline content distribution with the all-new Apple School Manager.

Audience Level: All
Audience Knowledge:
Track: Desktop Support
1:1 Implementation From Birth to Beyond & Everything In-Between

Room 102

This presentation will be on the process...

Session Details
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York 1:1 Implementation From Birth to Beyond & Everything In-Between This presentation will be on the process... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

1:1 Implementation From Birth to Beyond & Everything In-Between

Presenter: Gary Honabach
May 2 - 9:00 AM
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York 1:1 Implementation From Birth to Beyond & Everything In-Between This presentation will be on the progress Bloomsburg Area School District has made implementing 1:1 in our district. It will discuss the ground up start of the idea, the hurdles we have encountered, the successes we have had, and the planning that went into going 1:1 with Microsoft Surface Pros. Focus will be on steps taken, preparation, policies created, lessons learned, Professional Development, deployment, support, breakage strategies, and much more. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This presentation will be on the progress Bloomsburg Area School District has made implementing 1:1 in our district. It will discuss the ground up start of the idea, the hurdles we have encountered, the successes we have had, and the planning that went into going 1:1 with Microsoft Surface Pros. Focus will be on steps taken, preparation, policies created, lessons learned, Professional Development, deployment, support, breakage strategies, and much more.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Legal Concerns in a 1:1 Environment

Room 111

This session is for administrators, business ma...

Session Details
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Legal Concerns in a 1:1 Environment This session is for administrators, business ma... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Legal Concerns in a 1:1 Environment

Presenter: Mark Walz
May 2 - 9:00 AM
2017-05-02 09:00:00 2017-05-02 10:00:00 America/New_York Legal Concerns in a 1:1 Environment This session is for administrators, business managers, and technology staff, and covers an overview of the various thorny legal issues associated with the deployment of 1:1 devices.  Issues including student liability for damaged technology, the legality of technology and insurance fees, administrator searches of 1:1 devices, device management concerns and the privacy rights of students, 1:1 devices and software for IEP students, and the legal process needed prior to the adoption of new software or apps.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This session is for administrators, business managers, and technology staff, and covers an overview of the various thorny legal issues associated with the deployment of 1:1 devices.  Issues including student liability for damaged technology, the legality of technology and insurance fees, administrator searches of 1:1 devices, device management concerns and the privacy rights of students, 1:1 devices and software for IEP students, and the legal process needed prior to the adoption of new software or apps.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Morning Break

10:00 AM - 10:30 AM, Morning snack and coffee will be served in the sponsor hall

10:30 AM - 11:30 AM

Log Analysis for Security Continued

Room 110

As information technology professionals...

Session Details
2017-05-02 10:30:00 2017-05-17 11:30:00 America/New_York Log Analysis for Security Continued As information technology professionals... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Log Analysis for Security Continued

May 2 - 10:30 AM
2017-05-02 10:30:00 2017-05-17 11:30:00 America/New_York Log Analysis for Security Continued As information technology professionals, security is not something we can ignore—it is something that impacts us every day. For those of us operating in an Active Directory environment, we need to know what information is available to help identify if—and when—we may have been compromised. In response to feedback from last year's presentation, this session will review the information available to monitor and also will show you how to get the information from your servers to a log management system (this is the new part). In addition, you will learn how to setup and configure a Greylog server. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

As information technology professionals, security is not something we can ignore—it is something that impacts us every day. For those of us operating in an Active Directory environment, we need to know what information is available to help identify if—and when—we may have been compromised. In response to feedback from last year's presentation, this session will review the information available to monitor and also will show you how to get the information from your servers to a log management system (this is the new part). In addition, you will learn how to setup and configure a Greylog server.

Audience Level: All
Audience Knowledge:
Track: System Administration
How to Make People Think You Are a Good Systems Admin

Room 107

This presentation will focus on best practices...

Session Details
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York How to Make People Think You Are a Good Systems Admin This presentation will focus on best practices... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

How to Make People Think You Are a Good Systems Admin

Presenter: Brian Steigauf
May 2 - 10:30 AM
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York How to Make People Think You Are a Good Systems Admin This presentation will focus on best practices and gotchas for the systems administrator. I have been doing this for 16 years, have performed assessments, and helped in staff transitions for many school districts. Learn from what I've experienced in the trenches and what I've seen deployed to make you a better systems administrator. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This presentation will focus on best practices and gotchas for the systems administrator. I have been doing this for 16 years, have performed assessments, and helped in staff transitions for many school districts. Learn from what I've experienced in the trenches and what I've seen deployed to make you a better systems administrator.

Audience Level: All
Audience Knowledge:
Track: System Administration
Secondary and Backup Internet Connections

Room 103

With 1:1 programs on the rise, adding a second...

Session Details
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Secondary and Backup Internet Connections With 1:1 programs on the rise, adding a second... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Secondary and Backup Internet Connections

Presenter: Mike Graham
May 2 - 10:30 AM
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Secondary and Backup Internet Connections With 1:1 programs on the rise, adding a second Internet connection to your network may be something you are considering for emergencies or for additional bandwidth. Hempfield has used several different methods of integrating a second connection into the network. This session will cover secondary sources of Internet access, funding, methods of implementation, network addressing, routing, and other considerations. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

With 1:1 programs on the rise, adding a second Internet connection to your network may be something you are considering for emergencies or for additional bandwidth. Hempfield has used several different methods of integrating a second connection into the network. This session will cover secondary sources of Internet access, funding, methods of implementation, network addressing, routing, and other considerations.

Audience Level: All
Audience Knowledge: A basic understanding of networks, IP addressing, NAT, and routing
Track: Network Administration
IPv6 Training Continued

Room 104

This training will provide attendees with...

Session Details
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York IPv6 Training Continued This training will provide attendees with... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

IPv6 Training Continued

May 2 - 10:30 AM
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York IPv6 Training Continued This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Introducing iOS 10 and MacOS Sierra

Room 105

Join us to learn how iOS 10 and macOS Sierra g...

Session Details
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Introducing iOS 10 and MacOS Sierra Join us to learn how iOS 10 and macOS Sierra g... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Introducing iOS 10 and MacOS Sierra

Presenter: Apple
May 2 - 10:30 AM
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Introducing iOS 10 and MacOS Sierra Join us to learn how iOS 10 and macOS Sierra give students and teachers powerful new ways to access, collaborate on, and share documents across devices and apps. See how iOS 10 and macOS Sierra give schools more ways to manage content and devices. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Join us to learn how iOS 10 and macOS Sierra give students and teachers powerful new ways to access, collaborate on, and share documents across devices and apps. See how iOS 10 and macOS Sierra give schools more ways to manage content and devices.

Audience Level: All
Audience Knowledge:
Track: Desktop Support
Building Culture by Padcasting Your School’s Story

Room 102

How do parents, students, the community, and ot...

Session Details
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Building Culture by Padcasting Your School’s Story How do parents, students, the community, and ot... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Building Culture by Padcasting Your School’s Story

Presenter: JR Renna
May 2 - 10:30 AM
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Building Culture by Padcasting Your School’s Story How do parents, students, the community, and other staff know about the amazing things happening every day in your school if you do not tell their story? This session will tell the story of how Parkland School District utilized the work of Dr. Tony Sinanis from his book "Hacking Leadership" to build transparency and stakeholder investment in their schools. A student tech team led initiative, kids are using Padcasters and working with teachers and administrators to share events on social media. The initiative has created powerfully positive and creative results. Join us to learn how you can bring this back to your own school.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

How do parents, students, the community, and other staff know about the amazing things happening every day in your school if you do not tell their story? This session will tell the story of how Parkland School District utilized the work of Dr. Tony Sinanis from his book "Hacking Leadership" to build transparency and stakeholder investment in their schools. A student tech team led initiative, kids are using Padcasters and working with teachers and administrators to share events on social media. The initiative has created powerfully positive and creative results. Join us to learn how you can bring this back to your own school.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Online Safety

Room 111

This session covers the essential lessons that...

Session Details
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Online Safety This session covers the essential lessons that... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Online Safety

Presenter: Mark Walz
May 2 - 10:30 AM
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Online Safety This session covers the essential lessons that school teachers and administrators should be providing to students about online safety, including sharing personal information, cyber-bullying and online harassment, and the responsible use of social media.  The session also covers precautions school districts should take to prevent inappropriate communications between teachers and students and a discussion of the legal aspects of 1:1 device management software and active monitoring of student Internet use.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This session covers the essential lessons that school teachers and administrators should be providing to students about online safety, including sharing personal information, cyber-bullying and online harassment, and the responsible use of social media.  The session also covers precautions school districts should take to prevent inappropriate communications between teachers and students and a discussion of the legal aspects of 1:1 device management software and active monitoring of student Internet use.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Herding Cats: A Case Study in Managing a Software Development Project

Room 101

Using an internal project as an example...

Session Details
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Herding Cats: A Case Study in Managing a Software Development Project Using an internal project as an example... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Herding Cats: A Case Study in Managing a Software Development Project

Presenter: Matthew Kernicky
May 2 - 10:30 AM
2017-05-02 10:30:00 2017-05-02 11:30:00 America/New_York Herding Cats: A Case Study in Managing a Software Development Project Using an internal project as an example, the IU13 team will walk through the steps they took to successfully complete a software development project. This session will cover early stages of project conceptualization to production release and sign-off. Project complications, deadline shifts, and missteps will be addressed along with actions taken to mitigate them.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Using an internal project as an example, the IU13 team will walk through the steps they took to successfully complete a software development project. This session will cover early stages of project conceptualization to production release and sign-off. Project complications, deadline shifts, and missteps will be addressed along with actions taken to mitigate them.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

11:30 AM - 12:00 PM

Behind the Scenes Wizardry for Classroom Success with Apple Tech

Room 102

With the correct tool System Administrators can...

Session Details
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Behind the Scenes Wizardry for Classroom Success with Apple Tech With the correct tool System Administrators can... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Behind the Scenes Wizardry for Classroom Success with Apple Tech

Presenter: Adam Keller
May 2 - 11:30 AM
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Behind the Scenes Wizardry for Classroom Success with Apple Tech With the correct tool System Administrators can help users become technologically independent while maintaining policy and control. Jamf Pro allows IT to silently enable teacher and student experience with Apple devices. With everything from zero-touch deployments to classroom tools, Jamf Pro simply and elegantly performs each task needed of a device management system, all while mitigating downtime and allowing significant effort reduction in the day to day. With industry leading support and development, Jamf Pro can help you succeed with the Apple Platform.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

With the correct tool System Administrators can help users become technologically independent while maintaining policy and control. Jamf Pro allows IT to silently enable teacher and student experience with Apple devices. With everything from zero-touch deployments to classroom tools, Jamf Pro simply and elegantly performs each task needed of a device management system, all while mitigating downtime and allowing significant effort reduction in the day to day. With industry leading support and development, Jamf Pro can help you succeed with the Apple Platform.

Audience Level: All
Audience Knowledge:
Track: System Administration
Low/No Budget IP Telephony Using FreePBX

Room 111

Do you need a full-featured telephone system bu...

Session Details
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Low/No Budget IP Telephony Using FreePBX Do you need a full-featured telephone system bu... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Low/No Budget IP Telephony Using FreePBX

Presenter: Jason Carbaugh
May 2 - 11:30 AM
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Low/No Budget IP Telephony Using FreePBX Do you need a full-featured telephone system but have no money? This session will explore using FreePBX from Sangoma, which, as the name implies, is totally free. This solution can be run in your existing virtual environment, so there is no hardware to buy. You can use softphone software for no cost, or you can choose to use low-cost IP phones for your end-users. We will explore setup and implementation of this solution, and view a "live" system so you can get an idea of what options it supports.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Do you need a full-featured telephone system but have no money? This session will explore using FreePBX from Sangoma, which, as the name implies, is totally free. This solution can be run in your existing virtual environment, so there is no hardware to buy. You can use softphone software for no cost, or you can choose to use low-cost IP phones for your end-users. We will explore setup and implementation of this solution, and view a "live" system so you can get an idea of what options it supports.

Audience Level: Intermediate
Audience Knowledge:
Track: System Administration
IPv6 Training Continued

Room 104

This training will provide attendees with...

Session Details
2017-05-02 11:30:00 2017-05-02 12:30:00 America/New_York IPv6 Training Continued This training will provide attendees with... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

IPv6 Training Continued

May 2 - 11:30 AM
2017-05-02 11:30:00 2017-05-02 12:30:00 America/New_York IPv6 Training Continued This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This training will provide attendees with the foundation for the IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: addressing, architecture, capabilities, configuration, features, header translation, integration, migration planning, packet generation, QoS, routing, security, specification, transition mechanisms, troubleshooting, and tunneling. This coursework is approved and certified by the IPv6 Forum.

Audience Level: Expert
Audience Knowledge:
Track: Network Administration
Squeezing the Most Out of Your Bandwidth

Room 107

Some of us need every drop of bandwidth we...

Session Details
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Squeezing the Most Out of Your Bandwidth Some of us need every drop of bandwidth we... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Squeezing the Most Out of Your Bandwidth

Presenter: Robert Ogan
May 2 - 11:30 AM
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Squeezing the Most Out of Your Bandwidth Some of us need every drop of bandwidth we can get, others just need to access certain content more efficiently, but we can all benefit from taking a closer look at how we can make our networks run better.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Some of us need every drop of bandwidth we can get, others just need to access certain content more efficiently, but we can all benefit from taking a closer look at how we can make our networks run better.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Replacing QR Codes on Fliers: Exploiting Bystanders’ Trust

Room 101

This talk describes a nontechnical social...

Session Details
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Replacing QR Codes on Fliers: Exploiting Bystanders’ Trust This talk describes a nontechnical social... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Replacing QR Codes on Fliers: Exploiting Bystanders’ Trust

Presenter: Aaron Thomas
May 2 - 11:30 AM
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Replacing QR Codes on Fliers: Exploiting Bystanders’ Trust This talk describes a nontechnical social engineering attack that preys on the user's trust. A QR code on a flier found on a bulletin board surrounded by other fliers should be trustworthy, right? Take down the flier, replace the QR code, put up copies. You will get to learn about how to identify vulnerable bulletin boards, covertly snagging a flier, replacing the flier with a replaced QR code. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This talk describes a nontechnical social engineering attack that preys on the user's trust. A QR code on a flier found on a bulletin board surrounded by other fliers should be trustworthy, right? Take down the flier, replace the QR code, put up copies. You will get to learn about how to identify vulnerable bulletin boards, covertly snagging a flier, replacing the flier with a replaced QR code.

Audience Level: All
Audience Knowledge:
Track: Desktop Support
osTicket – Open Source Support Ticketing System

Room 110

An end user submits a support ticket. It magic...

Session Details
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York osTicket – Open Source Support Ticketing System An end user submits a support ticket. It magic... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

osTicket – Open Source Support Ticketing System

Presenter: Doug Rose
May 2 - 11:30 AM
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York osTicket – Open Source Support Ticketing System An end user submits a support ticket. It magically gets fixed. The ticket gets closed. What the end user does not know is that it took the IT Staff an hour of Googling to resolve the issue. All it ended up being was one setting that was misconfigured. The help desk may get overlooked sometimes in discussions, meetings, or just simple maintenance, but it is a vital piece to the technology department. It allows your IT staff to work more efficiently on incoming issues and prioritize requests to make sure everyone is happy from the top-down. All past, future, and FAQs can be documented in one location allowing your staff to search through old tickets to find solutions for the new ones. This presentation will focus on the open source platform “osTicket” that is used in our district. It will cover everything from installation and setup to how we use it daily.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

An end user submits a support ticket. It magically gets fixed. The ticket gets closed. What the end user does not know is that it took the IT Staff an hour of Googling to resolve the issue. All it ended up being was one setting that was misconfigured. The help desk may get overlooked sometimes in discussions, meetings, or just simple maintenance, but it is a vital piece to the technology department. It allows your IT staff to work more efficiently on incoming issues and prioritize requests to make sure everyone is happy from the top-down. All past, future, and FAQs can be documented in one location allowing your staff to search through old tickets to find solutions for the new ones. This presentation will focus on the open source platform “osTicket” that is used in our district. It will cover everything from installation and setup to how we use it daily.

Audience Level: All
Audience Knowledge:
Track: Desktop Support
Rapid Prototyping Technology for the Classroom

Room 103

This presentation is an introduction to Rapid...

Session Details
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Rapid Prototyping Technology for the Classroom This presentation is an introduction to Rapid... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Rapid Prototyping Technology for the Classroom

Presenter: Stephen Peltier
May 2 - 11:30 AM
2017-05-02 11:30:00 2017-05-02 12:00:00 America/New_York Rapid Prototyping Technology for the Classroom This presentation is an introduction to Rapid Prototyping with examples and expert classroom teachers to aid in explaining the systems and resources. Multiple 3-D printers will be discussed, as well as Laser cutting and engraving, CNC routers, and mills. In addition to the rapid prototyping tools the software used will also be discussed.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This presentation is an introduction to Rapid Prototyping with examples and expert classroom teachers to aid in explaining the systems and resources. Multiple 3-D printers will be discussed, as well as Laser cutting and engraving, CNC routers, and mills. In addition to the rapid prototyping tools the software used will also be discussed.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Lunch

12:00 PM - 2:00 PM, Sponsor Hall

2:00 PM - 3:00 PM

Simplify Your Management of Windows, Mac, iOS, & Android Devices Within a Single Platform

Room 107

PA based Account Manager (Rusty Clementoni)...

Session Details
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Simplify Your Management of Windows, Mac, iOS, & Android Devices Within a Single Platform PA based Account Manager (Rusty Clementoni)... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Simplify Your Management of Windows, Mac, iOS, & Android Devices Within a Single Platform

Presenter: Rusty Clementoni
May 2 - 2:00 PM
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Simplify Your Management of Windows, Mac, iOS, & Android Devices Within a Single Platform PA based Account Manager (Rusty Clementoni) will take you through an overview of how FileWave has been simplifying Endpoint Management throughout Missouri and across the Country. Since 1992, FileWave has lead the marketplace providing education, enterprise, and government institutions around the world with enterprise level, multi-platform systems, and mobile endpoint management software to assist IT teams throughout the lifecycle process of imaging, deployment, management, tracking and maintenance. FileWave’s all-inclusive, highly scalable software solves the many challenges of managing a diverse and growing population of users, devices, and content by ensuring IT teams have a comprehensive solution that supports both client (desktop/laptop) and mobile devices across Windows, Mac, iOS and Android. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

PA based Account Manager (Rusty Clementoni) will take you through an overview of how FileWave has been simplifying Endpoint Management throughout Missouri and across the Country. Since 1992, FileWave has lead the marketplace providing education, enterprise, and government institutions around the world with enterprise level, multi-platform systems, and mobile endpoint management software to assist IT teams throughout the lifecycle process of imaging, deployment, management, tracking and maintenance. FileWave’s all-inclusive, highly scalable software solves the many challenges of managing a diverse and growing population of users, devices, and content by ensuring IT teams have a comprehensive solution that supports both client (desktop/laptop) and mobile devices across Windows, Mac, iOS and Android.

Audience Level: All
Audience Knowledge:
Track: System Administration
Intrusion Detection Leveraging Microsoft Advanced Threat Analytics

Room 101

Over 60% of all network intrusions are traced...

Session Details
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Intrusion Detection Leveraging Microsoft Advanced Threat Analytics Over 60% of all network intrusions are traced... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Intrusion Detection Leveraging Microsoft Advanced Threat Analytics

Presenter: Mike Shellenberger
May 2 - 2:00 PM
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Intrusion Detection Leveraging Microsoft Advanced Threat Analytics Over 60% of all network intrusions are traced back to compromised user credentials. From detecting known malicious attacks to uncovering abnormal activity with machine learning and behavioral analytics, identify advanced persistent threats to your enterprise quickly and take action swiftly with Microsoft Advanced Threat Analytics. Join us and learn how ATA can play a key role in your organizations layered security approach. We will also cover the fundamentals of deployment and how to get started with ATA.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Over 60% of all network intrusions are traced back to compromised user credentials. From detecting known malicious attacks to uncovering abnormal activity with machine learning and behavioral analytics, identify advanced persistent threats to your enterprise quickly and take action swiftly with Microsoft Advanced Threat Analytics. Join us and learn how ATA can play a key role in your organizations layered security approach. We will also cover the fundamentals of deployment and how to get started with ATA.

Audience Level: All
Audience Knowledge: Basic network administration and active directory skills.
Track: System Administration
Unlock the Key to Repel Ransomware

Room 103

Your screen freezes and a dialogue box pops up...

Session Details
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Unlock the Key to Repel Ransomware Your screen freezes and a dialogue box pops up... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Unlock the Key to Repel Ransomware

Presenter: Mark Villinski
May 2 - 2:00 PM
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Unlock the Key to Repel Ransomware Your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be gone forever if you do not pay up. Since many victims are willing to pay the ransom, this type of crypto malware is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.

During this session you will hear from Mark Villinski, Kaspersky Lab, on what they as a security vendor are seeing in this growing area of focus for both security vendors and cybercriminals.
Areas of focus will include: common ransomware scenarios and delivery mechanisms, trends in this growing form of cybercrime, and recommendations to help your organization avoid being a victim.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be gone forever if you do not pay up. Since many victims are willing to pay the ransom, this type of crypto malware is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.

During this session you will hear from Mark Villinski, Kaspersky Lab, on what they as a security vendor are seeing in this growing area of focus for both security vendors and cybercriminals.
Areas of focus will include: common ransomware scenarios and delivery mechanisms, trends in this growing form of cybercrime, and recommendations to help your organization avoid being a victim.

Audience Level: Intermediate
Audience Knowledge:
Track: Network Administration
Enterprise Mobility & Security

Room 102

Pennsylvania k-12 districts have access, throug...

Session Details
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Enterprise Mobility & Security Pennsylvania k-12 districts have access, throug... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Enterprise Mobility & Security

Presenter: Michael Heffley
May 2 - 2:00 PM
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Enterprise Mobility & Security Pennsylvania k-12 districts have access, through state-wide contracting, to Microsoft’s EM+S suite of solutions supporting 1-to-1 initiatives, BYOD scenarios, enhanced security and Identity Management capabilities such as multi-factor authentication, Single-Sign-On, identity federation, and password self-service, among others. This session provides an overview of the EM+S capabilities your district may already own, and suggests specific low cost, low risk steps that IT Professionals can take to start receiving value from this platform.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Pennsylvania k-12 districts have access, through state-wide contracting, to Microsoft’s EM+S suite of solutions supporting 1-to-1 initiatives, BYOD scenarios, enhanced security and Identity Management capabilities such as multi-factor authentication, Single-Sign-On, identity federation, and password self-service, among others. This session provides an overview of the EM+S capabilities your district may already own, and suggests specific low cost, low risk steps that IT Professionals can take to start receiving value from this platform.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Why Flash Alone Will Not Close the App-Data Gap

Room 104

We live in an era of high-speed wireless, flash...

Session Details
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Why Flash Alone Will Not Close the App-Data Gap We live in an era of high-speed wireless, flash... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Why Flash Alone Will Not Close the App-Data Gap

Presenter: Richard Ens
May 2 - 2:00 PM
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Why Flash Alone Will Not Close the App-Data Gap We live in an era of high-speed wireless, flash storage, and cloud computing on tap. But it does not always feel that way, does it? The spinning ball on your desktop, the query that takes hours to run—IT delays are still a fact of life. That is one of the reasons for the surge of interest in flash storage. But anyone expecting flash alone to solve their performance problems is in for a disappointment. New research shows that slow storage is just one reason for delays between data requests and data delivery—a phenomenon known as the app-data gap. To close the app-data gap, IT organizations need to leverage predictive analytics that harness data gathered from thousands of sensors across every piece of the data center. Join us to learn how the Nimble Storage Predictive Flash Platform delivers data velocity by using InfoSight predictive analytics and a Unified Flash Fabric to close the app-data gap.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

We live in an era of high-speed wireless, flash storage, and cloud computing on tap. But it does not always feel that way, does it? The spinning ball on your desktop, the query that takes hours to run—IT delays are still a fact of life. That is one of the reasons for the surge of interest in flash storage. But anyone expecting flash alone to solve their performance problems is in for a disappointment. New research shows that slow storage is just one reason for delays between data requests and data delivery—a phenomenon known as the app-data gap. To close the app-data gap, IT organizations need to leverage predictive analytics that harness data gathered from thousands of sensors across every piece of the data center. Join us to learn how the Nimble Storage Predictive Flash Platform delivers data velocity by using InfoSight predictive analytics and a Unified Flash Fabric to close the app-data gap.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Transforming Teaching and Learning in the Digital Age

Room 111

In this session, we will explore ways to transf...

Session Details
2017-05-02 14:00:00 2017-05-02 16:00:00 America/New_York Transforming Teaching and Learning in the Digital Age In this session, we will explore ways to transf... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Transforming Teaching and Learning in the Digital Age

Presenter: David Andrade
May 2 - 2:00 PM
2017-05-02 14:00:00 2017-05-02 16:00:00 America/New_York Transforming Teaching and Learning in the Digital Age In this session, we will explore ways to transform teaching and learning. Technology, devices, cloud services, classroom design, and more will be explored as ways to improve teaching and learning with technology. Emphasis will be on the why and how versus the specific technology.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

In this session, we will explore ways to transform teaching and learning. Technology, devices, cloud services, classroom design, and more will be explored as ways to improve teaching and learning with technology. Emphasis will be on the why and how versus the specific technology.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Expectations for a Safe and Secure Learning Environment

Room 105

School districts and higher education instituti...

Session Details
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Expectations for a Safe and Secure Learning Environment School districts and higher education instituti... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Expectations for a Safe and Secure Learning Environment

Presenter: George Lazarou Presenter: Doug Rose
May 2 - 2:00 PM
2017-05-02 14:00:00 2017-05-02 15:00:00 America/New_York Expectations for a Safe and Secure Learning Environment School districts and higher education institutions must adapt to the changing landscape of technology in education. In this session, Mr. Lazarou will provide actionable approaches to help education stakeholders adopt a security framework, understand the difference between security and compliance, and prioritize investment in IT security to ensure a safe learning environment for students, faculty, and administrators. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

School districts and higher education institutions must adapt to the changing landscape of technology in education. In this session, Mr. Lazarou will provide actionable approaches to help education stakeholders adopt a security framework, understand the difference between security and compliance, and prioritize investment in IT security to ensure a safe learning environment for students, faculty, and administrators.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Afternoon Break

3:00 PM - 3:30 AM, Afternoon snacks and drinks will be served in the sponsor hall

3:30 PM - 4:30 PM

GIT for Non-Developers

Room 107

Git is a powerful free and open source software...

Session Details
2017-05-02 15:30:00 2017-05-12 16:30:00 America/New_York GIT for Non-Developers Git is a powerful free and open source software... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

GIT for Non-Developers

Presenter: Mark Sandblade
May 2 - 3:30 PM
2017-05-02 15:30:00 2017-05-12 16:30:00 America/New_York GIT for Non-Developers Git is a powerful free and open source software version control system that many developers use to safely collaborate on the same software project. Git's usefulness is not just limited to developers. Git has many potential uses for IT departments and non-developers. If you have things like network configs, login scripts, powershell, or documentation you need shared, versioned, documented, and backed-up then Git is your tool. Git can speed up your department's workflow, and help your staff learn from each other. This talk is intended for users with no Git experience with an emphasis on using Git for network and systems administration. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Git is a powerful free and open source software version control system that many developers use to safely collaborate on the same software project. Git's usefulness is not just limited to developers. Git has many potential uses for IT departments and non-developers. If you have things like network configs, login scripts, powershell, or documentation you need shared, versioned, documented, and backed-up then Git is your tool. Git can speed up your department's workflow, and help your staff learn from each other. This talk is intended for users with no Git experience with an emphasis on using Git for network and systems administration.

Audience Level: Novice
Audience Knowledge: Basic familiarity with command-line shells such as bash, cmd, or powershell is recommended but not necessary.
Track: System Administration
System Administration Round Table Discussion

Room 101

Open discussion on topics related to systems...

Session Details
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York System Administration Round Table Discussion Open discussion on topics related to systems... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

System Administration Round Table Discussion

Presenter: Brian Steigauf
May 2 - 3:30 PM
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York System Administration Round Table Discussion Open discussion on topics related to systems administration. This moderated round table discussion will be user-driven and can cover virtualization, storage technologies, and software that may be helpful in the day-to-day K12 operations. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Open discussion on topics related to systems administration. This moderated round table discussion will be user-driven and can cover virtualization, storage technologies, and software that may be helpful in the day-to-day K12 operations.

Audience Level: All
Audience Knowledge:
Track: System Administration
Network Administration Round Table Discussion

Room 103

Come discuss ideas to improve management...

Session Details
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Network Administration Round Table Discussion Come discuss ideas to improve management... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Network Administration Round Table Discussion

Presenter: Roy Hoover
May 2 - 3:30 PM
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Network Administration Round Table Discussion Come discuss ideas to improve management of your network. How do others do it? What tools work well in a K12 environment with limited resources? How do you gain the visibility into the important data points on network performance without being overwhelmed with useless data? Share your stories, successes, and failures.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Come discuss ideas to improve management of your network. How do others do it? What tools work well in a K12 environment with limited resources? How do you gain the visibility into the important data points on network performance without being overwhelmed with useless data? Share your stories, successes, and failures.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Secondary and Backup Internet Connections (Repeat Session)

Room 110

With 1:1 programs on the rise, adding a second...

Session Details
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Secondary and Backup Internet Connections (Repeat Session) With 1:1 programs on the rise, adding a second... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Secondary and Backup Internet Connections (Repeat Session)

Presenter: Mike Graham
May 2 - 3:30 PM
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Secondary and Backup Internet Connections (Repeat Session) With 1:1 programs on the rise, adding a second Internet connection to your network may be something you are considering for emergencies or for additional bandwidth. Hempfield has used several different methods of integrating a second connection into the network. This session will cover secondary sources of Internet access, funding, methods of implementation, network addressing, routing, and other considerations. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

With 1:1 programs on the rise, adding a second Internet connection to your network may be something you are considering for emergencies or for additional bandwidth. Hempfield has used several different methods of integrating a second connection into the network. This session will cover secondary sources of Internet access, funding, methods of implementation, network addressing, routing, and other considerations.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Desktop Support Round Table Discussion

Room 104

From useful tools your district might be using...

Session Details
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Desktop Support Round Table Discussion From useful tools your district might be using... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Desktop Support Round Table Discussion

Presenter: Susan Koetzle Hoffman
May 2 - 3:30 PM
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Desktop Support Round Table Discussion From useful tools your district might be using to best practices, come ready to share and discuss all things desktop support. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

From useful tools your district might be using to best practices, come ready to share and discuss all things desktop support.

Audience Level: All
Audience Knowledge:
Track: Desktop Support
Technology Leadership Round Table Discussion

Room 102

Current trends, road-blocks, and successes...

Session Details
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Technology Leadership Round Table Discussion Current trends, road-blocks, and successes... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Technology Leadership Round Table Discussion

Presenter: Ashley Heagy Presenter: Tim Laubach
May 2 - 3:30 PM
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Technology Leadership Round Table Discussion Current trends, road-blocks, and successes—come prepared to discuss with other technology leaders how decisions are made and implemented, budgeting, staff management, hiring, retention, and other technology leadership related topics.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Current trends, road-blocks, and successes—come prepared to discuss with other technology leaders how decisions are made and implemented, budgeting, staff management, hiring, retention, and other technology leadership related topics.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Cyber Security Considerations

Room 105

What is your district doing to combat malicious...

Session Details
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Cyber Security Considerations What is your district doing to combat malicious... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Cyber Security Considerations

Presenter: Lotsie Wooten
May 2 - 3:30 PM
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Cyber Security Considerations What is your district doing to combat malicious logic? Do you have visibility into your network? How do you combat social engineering strategies on which hackers rely? How proactive should you be and what steps can you take to ensure that your data and systems are protected? Join a discussion with one district that is trying to answer these questions. Hopefully, we can learn some strategies together that we can apply to our district technology and learn about some useful tools that we can deploy in our environments to assist our fight in protecting our digital environments. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

What is your district doing to combat malicious logic? Do you have visibility into your network? How do you combat social engineering strategies on which hackers rely? How proactive should you be and what steps can you take to ensure that your data and systems are protected? Join a discussion with one district that is trying to answer these questions. Hopefully, we can learn some strategies together that we can apply to our district technology and learn about some useful tools that we can deploy in our environments to assist our fight in protecting our digital environments.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Introduction to Incident Response

Room 111

It is not a question of if, but a question of w...

Session Details
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Introduction to Incident Response It is not a question of if, but a question of w... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Introduction to Incident Response

Presenter: George Frazier
May 2 - 3:30 PM
2017-05-02 15:30:00 2017-05-02 16:30:00 America/New_York Introduction to Incident Response It is not a question of if, but a question of when IT leaders, system and network administrators, and enterprise defenders will experience a compromise. The presenter will introduce participants to computer security incident response based on the PICERL model: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. The PICERL model will be examined, along with suggestions and recommendations for implementing each step in the model. In addition, participants will be introduced to the foundational content of an incident response plan manual and various formats for developing incident handling procedures. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

It is not a question of if, but a question of when IT leaders, system and network administrators, and enterprise defenders will experience a compromise. The presenter will introduce participants to computer security incident response based on the PICERL model: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. The PICERL model will be examined, along with suggestions and recommendations for implementing each step in the model. In addition, participants will be introduced to the foundational content of an incident response plan manual and various formats for developing incident handling procedures.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Dinner

4:30 PM, Cork Factory Hotel

Systems
Administration
Network
Administration
Desktop
Support
Technology
Leadership
Day 3 Wednesday, May 3

9:00 AM - 10:00 AM

How to Make People Think You Are a Good Systems Admin (Repeat Session)

Room 101

This presentation will focus on best practices...

Session Details
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York How to Make People Think You Are a Good Systems Admin (Repeat Session) This presentation will focus on best practices... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

How to Make People Think You Are a Good Systems Admin (Repeat Session)

Presenter: Brian Steigauf
May 3 - 9:00 AM
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York How to Make People Think You Are a Good Systems Admin (Repeat Session) This presentation will focus on best practices and gotchas for the systems administrator. I have been doing this for 16 years, have performed assessments, and helped in staff transitions for many school districts. Learn from what I've experienced in the trenches and what I've seen deployed to make you a better systems administrator. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This presentation will focus on best practices and gotchas for the systems administrator. I have been doing this for 16 years, have performed assessments, and helped in staff transitions for many school districts. Learn from what I've experienced in the trenches and what I've seen deployed to make you a better systems administrator.

Audience Level: All
Audience Knowledge: All
Track: System Administration
Implementing Shared iPads

Room 104

This presentation will discuss processes for...

Session Details
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Implementing Shared iPads This presentation will discuss processes for... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Implementing Shared iPads

Presenter: Andrew Thumma
May 3 - 9:00 AM
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Implementing Shared iPads This presentation will discuss processes for implementing shared iPads. This will include Apple requirements such as DEP, an overview of settings within Jamf MDM, setting up Apple School Manager, Apple Caching Servers, and the general process of uploading information to the ASM. We will discuss things that we learned from our own implementation that we believe would be beneficial to know and plan for when implementing. There will also be a brief demonstration of enrolling a device into the shared iPad model.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This presentation will discuss processes for implementing shared iPads. This will include Apple requirements such as DEP, an overview of settings within Jamf MDM, setting up Apple School Manager, Apple Caching Servers, and the general process of uploading information to the ASM. We will discuss things that we learned from our own implementation that we believe would be beneficial to know and plan for when implementing. There will also be a brief demonstration of enrolling a device into the shared iPad model.

Audience Level: Intermediate
Audience Knowledge: Basic knowledge of iPads Basic knowledge of Mobile Device Management solutions Knowledge of apple concepts such as DEP would be helpful
Track: System Administration
Building Your Blue Team Lab with Free and Inexpensive Tools and Equipment

Room 107

During this session, participants will look at...

Session Details
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Building Your Blue Team Lab with Free and Inexpensive Tools and Equipment During this session, participants will look at... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Building Your Blue Team Lab with Free and Inexpensive Tools and Equipment

Presenter: George Frazier
May 3 - 9:00 AM
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Building Your Blue Team Lab with Free and Inexpensive Tools and Equipment During this session, participants will look at how to build a Blue Team Lab using free and inexpensive tools and equipment. Free and open source software such as VirtualBox, pfSense, and Security Onion can be installed on older hardware with the addition of inexpensive network cards, providing the student or new enterprise defender with a lab environment to better research and develop the skills necessary to create a defensible network and respond to incidents. Foundational security services such as NTP, Syslog, and Netflow installed on Ubuntu will be examined as well.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

During this session, participants will look at how to build a Blue Team Lab using free and inexpensive tools and equipment. Free and open source software such as VirtualBox, pfSense, and Security Onion can be installed on older hardware with the addition of inexpensive network cards, providing the student or new enterprise defender with a lab environment to better research and develop the skills necessary to create a defensible network and respond to incidents. Foundational security services such as NTP, Syslog, and Netflow installed on Ubuntu will be examined as well.

Audience Level: Novice
Audience Knowledge: Intermediate
Track: Network Administration
Going Phishing

Room 102

Phishing has been a popular method for attacke...

Session Details
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Going Phishing Phishing has been a popular method for attacke... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Going Phishing

Presenter: Andrew Sanders
May 3 - 9:00 AM
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Going Phishing Phishing has been a popular method for attackers to steal information. Learn about various methods used to exploit victims. See how to setup a Phishing server that can be used to simulate a phishing attack. Help your staff avoid becoming victims of phishing scams by educating them. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Phishing has been a popular method for attackers to steal information. Learn about various methods used to exploit victims. See how to setup a Phishing server that can be used to simulate a phishing attack. Help your staff avoid becoming victims of phishing scams by educating them.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Tech Leadership: Attempting Balance…

Room 103

How does a leader of district technology find...

Session Details
2017-05-02 09:00:00 2017-05-17 10:00:00 America/New_York Tech Leadership: Attempting Balance… How does a leader of district technology find... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Tech Leadership: Attempting Balance…

Presenter: Kent Sweigart
May 2 - 9:00 AM
2017-05-02 09:00:00 2017-05-17 10:00:00 America/New_York Tech Leadership: Attempting Balance… How does a leader of district technology find success? We suggest identifying strategic areas and district goals. Then balancing the wants of people, social and technology trends, school culture, and change itself to meet those goals. Our goal is to facilitate a discussion that will benefit district technology leaders as they navigate the ever-changing world of technology as it pertains to the educational setting. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

How does a leader of district technology find success? We suggest identifying strategic areas and district goals. Then balancing the wants of people, social and technology trends, school culture, and change itself to meet those goals. Our goal is to facilitate a discussion that will benefit district technology leaders as they navigate the ever-changing world of technology as it pertains to the educational setting.

Audience Level: Intermediate
Audience Knowledge: All may benefit, but those who are in leadership positions in their schools and work directly with district leadership will benefit most.
Track: Technology Leadership
Cyber Security Considerations (Repeat Session)

Room 110

What is your district doing to combat malicious...

Session Details
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Cyber Security Considerations (Repeat Session) What is your district doing to combat malicious... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Cyber Security Considerations (Repeat Session)

Presenter: Lotsie Wooten
May 3 - 9:00 AM
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Cyber Security Considerations (Repeat Session) What is your district doing to combat malicious logic? Do you have visibility into your network? How do you combat social engineering strategies on which hackers rely? How proactive should you be and what steps can you take to ensure that your data and systems are protected? Join a discussion with one district that is trying to answer these questions. Hopefully, we can learn some strategies together that we can apply to our district technology and learn about some useful tools that we can deploy in our environments to assist our fight in protecting our digital environments.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

What is your district doing to combat malicious logic? Do you have visibility into your network? How do you combat social engineering strategies on which hackers rely? How proactive should you be and what steps can you take to ensure that your data and systems are protected? Join a discussion with one district that is trying to answer these questions. Hopefully, we can learn some strategies together that we can apply to our district technology and learn about some useful tools that we can deploy in our environments to assist our fight in protecting our digital environments.

Audience Level: Novice
Audience Knowledge: Intermediate
Track: Technology Leadership
Chromebooks at Middle School (Grades 6-8)

Room 111

This presentation will provide a case study for...

Session Details
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Chromebooks at Middle School (Grades 6-8) This presentation will provide a case study for... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Chromebooks at Middle School (Grades 6-8)

Presenter: Randy McNally
May 3 - 9:00 AM
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Chromebooks at Middle School (Grades 6-8) This presentation will provide a case study for deploying Chromebooks to all middle school students via a 1:1 in-school program. The Chromebooks are used in all classes. The presentation will go through the steps to set up the distribution and collection of these devices, the maintenance and repair of these devices, and the network and administration of these devices.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This presentation will provide a case study for deploying Chromebooks to all middle school students via a 1:1 in-school program. The Chromebooks are used in all classes. The presentation will go through the steps to set up the distribution and collection of these devices, the maintenance and repair of these devices, and the network and administration of these devices.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Maximize Your New Microsoft PA EES Agreement

Room 105

This session will review the many benefits of...

Session Details
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Maximize Your New Microsoft PA EES Agreement This session will review the many benefits of... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Maximize Your New Microsoft PA EES Agreement

Presenter: Karen Oberly
May 3 - 9:00 AM
2017-05-03 09:00:00 2017-05-03 10:00:00 America/New_York Maximize Your New Microsoft PA EES Agreement This session will review the many benefits of the new Microsoft PA EES agreement, as well as include discussion and tips on how to leverage your agreement to maximize the investment. Learn how schools across Pennsylvania are leveraging the licenses and services included in the EES, to not only save money, but increase efficiencies. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This session will review the many benefits of the new Microsoft PA EES agreement, as well as include discussion and tips on how to leverage your agreement to maximize the investment. Learn how schools across Pennsylvania are leveraging the licenses and services included in the EES, to not only save money, but increase efficiencies.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Morning Break

10:00 AM - 10:30 AM, Morning snack and coffee will be served in the sponsor hall

10:30 AM -11:30 AM

Providing Self-Service Password Reset for Your District

Room 107

Are you in constant battle with your helpdesk...

Session Details
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York Providing Self-Service Password Reset for Your District Are you in constant battle with your helpdesk... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Providing Self-Service Password Reset for Your District

Presenter: Jeramy Kopacko
May 3 - 10:30 AM
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York Providing Self-Service Password Reset for Your District Are you in constant battle with your helpdesk tickets? Do you find your IT team consistently resolving the same issues? Join us as we introduce you to a solution to provide your IT service desk with a tool to cut down on user password issues. We will discuss features, benefits, and security for your district.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Are you in constant battle with your helpdesk tickets? Do you find your IT team consistently resolving the same issues? Join us as we introduce you to a solution to provide your IT service desk with a tool to cut down on user password issues. We will discuss features, benefits, and security for your district.

Audience Level: All
Audience Knowledge:
Track: System Administration
How to Manage Chromebooks On or Off Campus – Quickly and Easily

Room 102

This session will show participants how easy it...

Session Details
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York How to Manage Chromebooks On or Off Campus – Quickly and Easily This session will show participants how easy it... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

How to Manage Chromebooks On or Off Campus – Quickly and Easily

Presenter: Daniel Farina
May 3 - 10:30 AM
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York How to Manage Chromebooks On or Off Campus – Quickly and Easily This session will show participants how easy it is to secure Chromebooks across any school or district, no matter how large or distributed, using ibossConnect for Chromebook and the iboss Secure Web Gateway platform. During this presentation, iboss personnel will show how schools can manage their Chromebook deployment to ensure individualized filtering and reporting across all users, whether they are on- or off-campus, ensuring CIPA compliance, reducing IT resource requirements, and supporting 1:1 programs that enable anytime, anywhere learning.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This session will show participants how easy it is to secure Chromebooks across any school or district, no matter how large or distributed, using ibossConnect for Chromebook and the iboss Secure Web Gateway platform. During this presentation, iboss personnel will show how schools can manage their Chromebook deployment to ensure individualized filtering and reporting across all users, whether they are on- or off-campus, ensuring CIPA compliance, reducing IT resource requirements, and supporting 1:1 programs that enable anytime, anywhere learning.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Next-Gen Cloud-Based Web Filtering & Parental Integration

Room 110

This session will focus on exploring an entirel...

Session Details
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York Next-Gen Cloud-Based Web Filtering & Parental Integration This session will focus on exploring an entirel... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Next-Gen Cloud-Based Web Filtering & Parental Integration

Presenter: David Huson
May 3 - 10:30 AM
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York Next-Gen Cloud-Based Web Filtering & Parental Integration This session will focus on exploring an entirely new and different approach to web filtering and student safety online. Securly is 100% cloud-based and a solution for any device, anywhere, with a new approach to student online safety. Learn about how cloud-based filtering works and review 1:1 deployment scenarios. Find out more about cyber bullying and how to better address violent self-harm topics on social media sites and e-mail. We will also dive into our new parent portal and discuss how you can involve parents in your digital citizenship initiatives for online student safety and productivity.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This session will focus on exploring an entirely new and different approach to web filtering and student safety online. Securly is 100% cloud-based and a solution for any device, anywhere, with a new approach to student online safety. Learn about how cloud-based filtering works and review 1:1 deployment scenarios. Find out more about cyber bullying and how to better address violent self-harm topics on social media sites and e-mail. We will also dive into our new parent portal and discuss how you can involve parents in your digital citizenship initiatives for online student safety and productivity.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Knowing is Half the Battle – Edge of Network Monitoring and Control

Room 104

The age of big data is causing an explosion of...

Session Details
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York Knowing is Half the Battle – Edge of Network Monitoring and Control The age of big data is causing an explosion of... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Knowing is Half the Battle – Edge of Network Monitoring and Control

Presenter: Nick Babiak
May 3 - 10:30 AM
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York Knowing is Half the Battle – Edge of Network Monitoring and Control The age of big data is causing an explosion of new IT deployments, as well as changing the geographical distribution and types of locations where these systems are deployed. The new generation of requirements create new challenges requiring higher visibility, control, and support in data centers, IDF closets, and remote sites. The goal of this presentation is to provide an intelligent view of how your staff can approach monitoring and control of your IT infrastructure. Downingtown School District will provide examples of how they approach their monitoring challenges with hopes of spurring discussion amongst attendees. We look forward to seeing you at our session!
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

The age of big data is causing an explosion of new IT deployments, as well as changing the geographical distribution and types of locations where these systems are deployed. The new generation of requirements create new challenges requiring higher visibility, control, and support in data centers, IDF closets, and remote sites. The goal of this presentation is to provide an intelligent view of how your staff can approach monitoring and control of your IT infrastructure. Downingtown School District will provide examples of how they approach their monitoring challenges with hopes of spurring discussion amongst attendees. We look forward to seeing you at our session!

Audience Level: All
Audience Knowledge:
Track: Network Administration
System Integration and Management with the Cloud

Room 101

This session will examine the challenges an IT...

Session Details
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York System Integration and Management with the Cloud This session will examine the challenges an IT... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

System Integration and Management with the Cloud

Presenter: Steve Katsman
May 3 - 10:30 AM
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York System Integration and Management with the Cloud This session will examine the challenges an IT administrator faces when more services are provided in the cloud. This includes ways to secure cloud-based email (O365/Gmail) and manage ChromeOS devices, as well as other cloud services currently being used in K12 Education. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

This session will examine the challenges an IT administrator faces when more services are provided in the cloud. This includes ways to secure cloud-based email (O365/Gmail) and manage ChromeOS devices, as well as other cloud services currently being used in K12 Education.

Audience Level: All
Audience Knowledge:
Track: Network Administration
VOIP – Enterprise Features on a School Budget

Room 105

Compare and contrast enterprise voice systems...

Session Details
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York VOIP – Enterprise Features on a School Budget Compare and contrast enterprise voice systems... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

VOIP – Enterprise Features on a School Budget

Presenter: Mark Crescenzi
May 3 - 10:30 AM
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York VOIP – Enterprise Features on a School Budget The presenter will compare and contrast enterprise voice systems looking at different pricing models, feature sets, and also various options for connecting to the outside world. He will explain SIP trunks, PRIs and PSTN connections for all to understand the differences. School district usage will be the context for the discussion. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

The presenter will compare and contrast enterprise voice systems looking at different pricing models, feature sets, and also various options for connecting to the outside world. He will explain SIP trunks, PRIs and PSTN connections for all to understand the differences. School district usage will be the context for the discussion.

Audience Level: Intermediate
Audience Knowledge:
Track: Network Administration
O365 and the Administration of Schools

Room 103

O365 for Education is a rich collection of tool...

Session Details
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York O365 and the Administration of Schools O365 for Education is a rich collection of tool... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

O365 and the Administration of Schools

Presenter: Jill Sitnick
May 3 - 10:30 AM
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York O365 and the Administration of Schools O365 for Education is a rich collection of tools that allow for enhanced collaboration and knowledge sharing for administrators and educational leaders. In this session, we will explore the newest applications added to your O365 portal, how they can be used to increase productivity across your organization, and how to get started.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

O365 for Education is a rich collection of tools that allow for enhanced collaboration and knowledge sharing for administrators and educational leaders. In this session, we will explore the newest applications added to your O365 portal, how they can be used to increase productivity across your organization, and how to get started.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Spark Board for Education: Multi-Use Classroom Device

Room 111

The Cisco Spark™ Board is a 3-in-1 team collabo...

Session Details
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York Spark Board for Education: Multi-Use Classroom Device The Cisco Spark™ Board is a 3-in-1 team collabo... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Spark Board for Education: Multi-Use Classroom Device

Presenter: John Stearns
May 3 - 10:30 AM
2017-05-03 10:30:00 2017-05-03 11:30:00 America/New_York Spark Board for Education: Multi-Use Classroom Device The Cisco Spark™ Board is a 3-in-1 team collaboration device for meeting rooms. The Cisco Spark™ Board, like no other, is a new team collaboration device that combines wireless presentation, digital white boarding, and video conferencing. It is fully cloud- and touch-based and designed for rich team collaboration, securely connecting physical and virtual meeting rooms. It resides in physical meeting rooms, but is connected to the Cisco Spark service to facilitate continuous workflow before the meeting starts and even after everyone has left the physical room. Through the Cisco Spark app, team members both in the physical conference room and attending remotely can meet, message, call, and now, white board from anywhere through their Cisco Spark app-enabled device of choice.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

The Cisco Spark™ Board is a 3-in-1 team collaboration device for meeting rooms. The Cisco Spark™ Board, like no other, is a new team collaboration device that combines wireless presentation, digital white boarding, and video conferencing. It is fully cloud- and touch-based and designed for rich team collaboration, securely connecting physical and virtual meeting rooms. It resides in physical meeting rooms, but is connected to the Cisco Spark service to facilitate continuous workflow before the meeting starts and even after everyone has left the physical room. Through the Cisco Spark app, team members both in the physical conference room and attending remotely can meet, message, call, and now, white board from anywhere through their Cisco Spark app-enabled device of choice.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Lunch

11:30 PM - 1:00 PM, Sponsor Hall

1:00 PM - 2:00 PM

AppLocker: Stop (Mostly) All the Bad Things

Room 101

We fight a never ending battle against viruses...

Session Details
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York AppLocker: Stop (Mostly) All the Bad Things We fight a never ending battle against viruses... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

AppLocker: Stop (Mostly) All the Bad Things

Presenter: Paul Williams
May 3 - 1:00 PM
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York AppLocker: Stop (Mostly) All the Bad Things We fight a never ending battle against viruses, malware, and our new favorite - ransomware. Microsoft's AppLocker is one tool that can help us gain an edge. While not foolproof, AppLocker can significantly reduce the time you spend fighting the bad things that attack your systems by restricting applications using a whitelist. This presentation will give you the information you need to start implementing AppLocker in your environment. You will learn what AppLocker is and is not good for, how to quickly get it set up and running, how to implement it with minimal impact to your users, and how to maintain it easily.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

We fight a never ending battle against viruses, malware, and our new favorite - ransomware. Microsoft's AppLocker is one tool that can help us gain an edge. While not foolproof, AppLocker can significantly reduce the time you spend fighting the bad things that attack your systems by restricting applications using a whitelist. This presentation will give you the information you need to start implementing AppLocker in your environment. You will learn what AppLocker is and is not good for, how to quickly get it set up and running, how to implement it with minimal impact to your users, and how to maintain it easily.

Audience Level: Intermediate
Audience Knowledge:
Track: System Administration
Protecting Powershell Scripts with Version Control

Room 107

During this session, version control of PowerSh...

Session Details
2017-05-03 13:00:00 2017-05-13 14:00:00 America/New_York Protecting Powershell Scripts with Version Control During this session, version control of PowerSh... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Protecting Powershell Scripts with Version Control

Presenter: Shawn Mellinger
May 3 - 1:00 PM
2017-05-03 13:00:00 2017-05-13 14:00:00 America/New_York Protecting Powershell Scripts with Version Control During this session, version control of PowerShell scripts will be discussed from a System Administrator's point of view. Concepts will be discussed and a demo of easy version control will be presented. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

During this session, version control of PowerShell scripts will be discussed from a System Administrator's point of view. Concepts will be discussed and a demo of easy version control will be presented.

Audience Level: All
Audience Knowledge:
Track: System Administration
Spanning-Tree Protocol

Room 111

In this session, we will go in depth into the S...

Session Details
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York Spanning-Tree Protocol In this session, we will go in depth into the S... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Spanning-Tree Protocol

Presenter: Frank Olshansky
May 3 - 1:00 PM
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York Spanning-Tree Protocol In this session, we will go in depth into the Spanning Tree Protocol (STP). Topics covered will include: why we need STP, the STP standards, what happens when things go wrong with STP, and best practices to prevent things from going wrong with STP. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

In this session, we will go in depth into the Spanning Tree Protocol (STP). Topics covered will include: why we need STP, the STP standards, what happens when things go wrong with STP, and best practices to prevent things from going wrong with STP.

Audience Level: All
Audience Knowledge:
Track: Network Administration
Low/No Budget IP Telephony Using FreePBX (Repeat Session)

Room 105

Do you need a full-featured telephone system bu...

Session Details
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York Low/No Budget IP Telephony Using FreePBX (Repeat Session) Do you need a full-featured telephone system bu... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Low/No Budget IP Telephony Using FreePBX (Repeat Session)

Presenter: Jason Carbaugh
May 3 - 1:00 PM
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York Low/No Budget IP Telephony Using FreePBX (Repeat Session) Do you need a full-featured telephone system but have no money? This session will explore using FreePBX from Sangoma, which, as the name implies, is totally free. This solution can be run in your existing virtual environment, so there is no hardware to buy. You can use softphone software for no cost, or you can choose to use low-cost IP phones for your end-users. We will explore setup and implementation of this solution, and view a "live" system so you can get an idea of what options it supports. Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Do you need a full-featured telephone system but have no money? This session will explore using FreePBX from Sangoma, which, as the name implies, is totally free. This solution can be run in your existing virtual environment, so there is no hardware to buy. You can use softphone software for no cost, or you can choose to use low-cost IP phones for your end-users. We will explore setup and implementation of this solution, and view a "live" system so you can get an idea of what options it supports.

Audience Level: Intermediate
Audience Knowledge:
Track: Network Administration
My Personal Information is None of Your Business! How to Keep Your Privacy Private in a Public World

Room 104

Is it possible to keep your privacy in today's...

Session Details
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York My Personal Information is None of Your Business! How to Keep Your Privacy Private in a Public World Is it possible to keep your privacy in today's... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

My Personal Information is None of Your Business! How to Keep Your Privacy Private in a Public World

Presenter: T.R. Laputka
May 3 - 1:00 PM
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York My Personal Information is None of Your Business! How to Keep Your Privacy Private in a Public World Is it possible to keep your privacy in today’s always-on, information-demanding, internet-connected world?
Businesses are making a fortune using and selling your personal information, and not paying you a dime for it. Learn how to keep your information away from prying corporations (and hackers!).
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Is it possible to keep your privacy in today’s always-on, information-demanding, internet-connected world?
Businesses are making a fortune using and selling your personal information, and not paying you a dime for it. Learn how to keep your information away from prying corporations (and hackers!).

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Leveraging Jamf for Personalized iOS Content with eSpark

Room 110

The demand for customized learning is becoming...

Session Details
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York Leveraging Jamf for Personalized iOS Content with eSpark The demand for customized learning is becoming... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Leveraging Jamf for Personalized iOS Content with eSpark

Presenter: Derek Sweigart
May 3 - 1:00 PM
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York Leveraging Jamf for Personalized iOS Content with eSpark The demand for customized learning is becoming more and more common in the school setting. eSpark is a tool that Pequea Valley uses to customize math instruction for our K12 learners. Come hear about eSpark and how we use Jamf to manage and deploy eSpark content.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

The demand for customized learning is becoming more and more common in the school setting. eSpark is a tool that Pequea Valley uses to customize math instruction for our K12 learners. Come hear about eSpark and how we use Jamf to manage and deploy eSpark content.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
Introduction to Incident Response (Repeat Session)

Room 102

It is not a question of if, but a question of w...

Session Details
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York Introduction to Incident Response (Repeat Session) It is not a question of if, but a question of w... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Introduction to Incident Response (Repeat Session)

Presenter: George Frazier
May 3 - 1:00 PM
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York Introduction to Incident Response (Repeat Session) It is not a question of if, but a question of when IT leaders, system and network administrators, and enterprise defenders will experience a compromise. The presenter will introduce participants to computer security incident response based on the PICERL model: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. The PICERL model will be examined, along with suggestions and recommendations for implementing each step in the model. In addition, participants will be introduced to the foundational content of an incident response plan manual and various formats for developing incident handling procedures.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

It is not a question of if, but a question of when IT leaders, system and network administrators, and enterprise defenders will experience a compromise. The presenter will introduce participants to computer security incident response based on the PICERL model: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. The PICERL model will be examined, along with suggestions and recommendations for implementing each step in the model. In addition, participants will be introduced to the foundational content of an incident response plan manual and various formats for developing incident handling procedures.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership
1:1 Without Limits – Macs, PC’s, and BYOD All-In-One

Room 103

Downingtown Area School District has recently...

Session Details
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York 1:1 Without Limits – Macs, PC’s, and BYOD All-In-One Downingtown Area School District has recently... Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

1:1 Without Limits – Macs, PC’s, and BYOD All-In-One

Presenter: Mike Balik
May 3 - 1:00 PM
2017-05-03 13:00:00 2017-05-03 14:00:00 America/New_York 1:1 Without Limits – Macs, PC’s, and BYOD All-In-One Downingtown Area School District has recently implemented a successful 1:1 deployment for our three high schools different from the traditional one size fits all model. Students were offered the choice between a district-provided Mac laptop, district-provided PC laptop, or BYOD. This presentation will focus on the process used to begin the program, including the collaboration between curriculum, technology, and building staff; presentations and communication with the school board; as well as the technical infrastructure built for successful wireless access and printing from any device. This session is a great resource for any school personnel interested in starting a 1:1 program or looking to do something different with their existing program.
Lancaster-Lebanon IU13, Lancaster, PA Tech Talk Live techtalklive@iu13.org

Downingtown Area School District has recently implemented a successful 1:1 deployment for our three high schools different from the traditional one size fits all model. Students were offered the choice between a district-provided Mac laptop, district-provided PC laptop, or BYOD. This presentation will focus on the process used to begin the program, including the collaboration between curriculum, technology, and building staff; presentations and communication with the school board; as well as the technical infrastructure built for successful wireless access and printing from any device. This session is a great resource for any school personnel interested in starting a 1:1 program or looking to do something different with their existing program.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

CONTACT

Tech Talk Live is the only conference of its kind in the region specifically designed for IT pros in education.


techtalklive@iu13.org
1020 New Holland Avenue, Lancaster, PA 17601

(717) 606-1770