Loading...

TECH TALK LIVE 2019 SCHEDULE

The Tech Talk Live team is working diligently on developing an amazing schedule for all levels of support within your technology team. Click here to view the slide presentations from Tech Talk Live 2018.

Access Control and Integration with Milestone XProtect

May 6 - 8:30 AM to 9:30 AM
Presenter: Justin Welch

App-Techs, which specializes in access control and security system integration, will demo the latest in integrated "IP to the door" solutions that are easy to use and manage and enhance your security response options. See how access control software and devices work in tandem with Milestone XProtect to connect with your security cameras, phone & intercom systems, mobile devices, and other third-party security equipment.

App-Techs specializes in the design, installation, support, and maintenance of video surveillance systems, access control, industrial wireless, and fiber-optic networks. The company also develops software integrations between Milestone XProtect and third-party security products.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: Network Administration

Account Provisioning and Single Sign On Made Easy with One Solution-ClassLink!

May 5 - 11:30 AM to 12:30 PM
Presenter: Bob Chappell

Imagine – access and account provisioning in one fully automated process! ClassLink automatically creates accounts (AD, Google and/or Azure/O365 via OneSync), which in turn creates a personalized digital learning access portal, via single sign-on and rostering. The analytics provides usage, time on task, ROI, license management and more. Hear what districts have to say!

Audience Level: Novice
Audience Knowledge: None
Track: Network Administration

Attack and Defense Techniques For Your Organization – Part 1

February 5 - 10:30 AM to 11:30 AM
Presenter: Todd Echterling

The internet is constantly in motion and so is the threat landscape. Having a strong security posture is imperative. We must make sure we are improving our protection, detection, and response to cyberthreats. In this session, we will learn both Red and Blue tactics to keep your organization secure. Topics covered will be security posture, cybersecurity kill chain, incident response, and many more. This session will be a mixture of hands-on and lecture. Come prepared with your own laptop (tablets won't work), a willingness to learn, and a hunger to secure your infrastructure.

Audience Level: Intermediate
Audience Knowledge:
Track: System Administration

Attack and Defense Techniques For Your Organization – Part 2

May 5 - 11:30 AM to 12:30 PM
Presenter: Todd Echterling

The internet is constantly in motion and so is the threat landscape. Having a strong security posture is imperative. We must make sure we are improving our protection, detection, and response to cyberthreats. In this session, we will learn both Red and Blue tactics to keep your organization secure. Topics covered will be security posture, cybersecurity kill chain, incident response, and many more. This session will be a mixture of hands-on and lecture. Come prepared with your own laptop (tablets won't work), a willingness to learn, and a hunger to secure your infrastructure.

Audience Level: Intermediate
Audience Knowledge:
Track: System Administration

Attracting, Hiring, and Retaining Employees

May 4 - 10:30 AM to 12:00 PM
Presenter: Tim Laubach
Presenter: Noel Johns

In today’s competitive job market, attracting and retaining qualified IT staff is an increasingly difficult task. In this session, we will explore the multi-faceted approach IU13 has taken to tackling this problem. Topics to be discussed include recruitment strategies, wage alignment, employee benefits (teleworking, flexible schedules, onsite medical center, etc.…), training, and more. We will also discuss how to determine if you are staffed appropriately and in-turn, how to ask for additional staff from your administration and board, where needed.

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Basic Network Design and Configuration Hands-On Part 2

May 4 - 3:00 PM to 4:30 PM
Presenter: Dan Baker
Presenter: IU13 Network Team

In this 3-hour hands-on session participants will learn about and practice good network design and configuration. We will focus on local area networks (LAN), virtual LANs (VLAN), IPv4 and IPv6 addressing, switching, and routing. We will also briefly discuss wide area networks (WAN), network address translation (NAT), security, and dynamic host configuration protocol (DHCP). In the lab portion of the session, participants will work in teams of two to build a campus LAN using demo equipment provided by Cisco. This session is appropriate for participants with any level of experience. No specific background knowledge is required. This session is limited to 30 participants, but may be repeated if there is sufficient interest. Participants should bring:
• a laptop running Windows, Linux, or macOS
• an ethernet cable (and ethernet adapter, if required)
• a USB serial adapter* (for example, Cable Matters 202031 or Tripp Lite USA-19HS)
OR
• a USB Mini-B cable

* a small number of loaners will be available at the session

Audience Level: Novice
Audience Knowledge: Basic familiarity with networking concepts and equipment will be helpful, but no specific networking experience is required.
Track: Network Administration

Basic Network Design and Configuration Hands-On Part 1

May 4 - 1:00 PM to 2:30 PM
Presenter: Dan Baker
Presenter: IU13 Network Team

In this 3-hour hands-on session participants will learn about and practice good network design and configuration. We will focus on local area networks (LAN), virtual LANs (VLAN), IPv4 and IPv6 addressing, switching, and routing. We will also briefly discuss wide area networks (WAN), network address translation (NAT), security, and dynamic host configuration protocol (DHCP). In the lab portion of the session, participants will work in teams of two to build a campus LAN using demo equipment provided by Cisco. This session is appropriate for participants with any level of experience. No specific background knowledge is required. This session is limited to 30 participants, but may be repeated if there is sufficient interest. Participants should bring:
• a laptop running Windows, Linux, or macOS
• an ethernet cable (and ethernet adapter, if required)
• a USB serial adapter* (for example, Cable Matters 202031 or Tripp Lite USA-19HS)
OR
• a USB Mini-B cable

* a small number of loaners will be available at the session

Audience Level: All
Audience Knowledge: Basic familiarity with networking concepts and equipment including network cables, IP addresses, switches, and routers will be helpful, but no specific networking experience is required.
Track: Network Administration

Basic Network Design and Configuration Hands-On Part 1 Repeat

May 5 - 9:00 AM to 10:00 AM
Presenter: Dan Baker
Presenter: IU13 Network Team

In this 3-hour hands-on session participants will learn about and practice good network design and configuration. We will focus on local area networks (LAN), virtual LANs (VLAN), IPv4 and IPv6 addressing, switching, and routing. We will also briefly discuss wide area networks (WAN), network address translation (NAT), security, and dynamic host configuration protocol (DHCP). In the lab portion of the session, participants will work in teams of two to build a campus LAN using demo equipment provided by Cisco. This session is appropriate for participants with any level of experience. No specific background knowledge is required. This session is limited to 30 participants, but may be repeated if there is sufficient interest. Participants should bring:
• a laptop running Windows, Linux, or macOS
• an ethernet cable (and ethernet adapter, if required)
• a USB serial adapter* (for example, Cable Matters 202031 or Tripp Lite USA-19HS)
OR
• a USB Mini-B cable

* a small number of loaners will be available at the session

Audience Level: All
Audience Knowledge: Basic familiarity with networking concepts and equipment will be helpful, but no specific networking experience is required.
Track: Network Administration

Basic Network Design and Configuration Hands-On Part 2 Repeat

May 5 - 10:30 AM to 11:30 AM
Presenter: Dan Baker
Presenter: IU13 Network Team

In this 3-hour hands-on session participants will learn about and practice good network design and configuration. We will focus on local area networks (LAN), virtual LANs (VLAN), IPv4 and IPv6 addressing, switching, and routing. We will also briefly discuss wide area networks (WAN), network address translation (NAT), security, and dynamic host configuration protocol (DHCP). In the lab portion of the session, participants will work in teams of two to build a campus LAN using demo equipment provided by Cisco. This session is appropriate for participants with any level of experience. No specific background knowledge is required. This session is limited to 30 participants, but may be repeated if there is sufficient interest. Participants should bring:
• a laptop running Windows, Linux, or macOS
• an ethernet cable (and ethernet adapter, if required)
• a USB serial adapter* (for example, Cable Matters 202031 or Tripp Lite USA-19HS)
OR
• a USB Mini-B cable

* a small number of loaners will be available at the session

Audience Level: All
Audience Knowledge: Basic familiarity with networking concepts and equipment will be helpful, but no specific networking experience is required.
Track: Network Administration

Basic Networking Design and Configuration Hands-On Part 2 Cont. Repeat

May 5 - 11:30 AM to 12:30 PM
Presenter: Dan Baker
Presenter: IU13 Network Team

In this 3-hour hands-on session participants will learn about and practice good network design and configuration. We will focus on local area networks (LAN), virtual LANs (VLAN), IPv4 and IPv6 addressing, switching, and routing. We will also briefly discuss wide area networks (WAN), network address translation (NAT), security, and dynamic host configuration protocol (DHCP). In the lab portion of the session, participants will work in teams of two to build a campus LAN using demo equipment provided by Cisco. This session is appropriate for participants with any level of experience. No specific background knowledge is required. This session is limited to 30 participants, but may be repeated if there is sufficient interest. Participants should bring:
• a laptop running Windows, Linux, or macOS
• an ethernet cable (and ethernet adapter, if required)
• a USB serial adapter* (for example, Cable Matters 202031 or Tripp Lite USA-19HS)
OR
• a USB Mini-B cable

* a small number of loaners will be available at the session

Audience Level: All
Audience Knowledge: Basic familiarity with networking concepts and equipment will be helpful, but no specific networking experience is required.
Track: Network Administration

Beware of the Dark Web-How to Properly Control Web Circumvention

May 5 - 2:00 PM to 3:00 PM
Presenter: Kent Haines

Students may be using school networks or computers to surf the Dark Web and you might not know it. They are using the Dark Web to buy drugs, guns and hire hackers, among other illicit behaviors, and students are doing this by bypassing school web filters which is a direct violation of district Internet Usage Policies. It is important to properly control web circumvention by preventing the use of suspicious applications such as Tor, Psiphon or UltraSurf. Learn how ContentKeeper Application Manager allows you to identify and control suspicious apps used to circumvent web filters, resulting in improved security and ensuring districts remain CIPA and FERPA compliant.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Building a Jamf Pro App with Swift

May 4 - 1:00 PM to 2:30 PM
Presenter: Mike Matz

In this session, attendees will learn the basics of using Xcode and Swift to build a working iOS app that integrates with the Jamf Pro API. Attendees will learn the basics of the Swift programming language, SwiftUI, and how to integrate 3rd party frameworks. The goal of this session is to expand your skillset by enabling you to design custom tools you can use in your existing environments. This workshop builds on my 2019 session "Leveraging the Jamf Pro API" Please come to this session with the latest version of Xcode installed.

Audience Level: All
Audience Knowledge: Experience with the Jamf Pro API
Track: System Administration

Building a Jamf Pro App with Swift – Continued

May 4 - 3:00 PM to 4:30 PM
Presenter: Mike Matz

In this session, attendees will learn the basics of using Xcode and Swift to build a working iOS app that integrates with the Jamf Pro API. Attendees will learn the basics of the Swift programming language, SwiftUI, and how to integrate 3rd party frameworks. The goal of this session is to expand your skillset by enabling you to design custom tools you can use in your existing environments. This workshop builds on my 2019 session "Leveraging the Jamf Pro API" Please come to this session with the latest version of Xcode installed.

Audience Level: Expert
Audience Knowledge: Experience with the Jamf Pro API
Track: System Administration

Cisco Threat Hunting Workshop

May 4 - 1:00 PM to 2:30 PM
Presenter: Kevin Wofford
Presenter: Dan Eyster

In the heat of a crisis, every keystroke counts and indecision could cost your organization millions. What separates security pros from security liabilities? A plan – and practice. Join Cisco for this hands-on Threat Hunting Workshop to develop your skills and test your abilities. In this workshop, you will learn how to quickly determine if your environment is impacted by a particular threat or set of threats, uncover best practices for threat hunting, learn how to incorporate threat hunting into your daily workflow, network with your peers to share strategies and techniques, and execute several real-world lab scenarios.

Audience Level: All
Audience Knowledge: Anyone with basic network or security knowledge will benefit from this workshop, but it will also be valuable for those with more advanced security skills and security operations experience.
Track: Network Administration

Cisco Threat Hunting Workshop Part 2

May 4 - 3:00 PM to 4:30 PM
Presenter: Kevin Wofford
Presenter: Dan Eyster

In the heat of a crisis, every keystroke counts and indecision could cost your organization millions. What separates security pros from security liabilities? A plan – and practice. Join Cisco for this hands-on Threat Hunting Workshop to develop your skills and test your abilities. In this workshop, you will learn how to quickly determine if your environment is impacted by a particular threat or set of threats, uncover best practices for threat hunting, learn how to incorporate threat hunting into your daily workflow, network with your peers to share strategies and techniques, and execute several real-world lab scenarios.

Audience Level: All
Audience Knowledge: Anyone with basic network or security knowledge will benefit from this workshop, but it will also be valuable for those with more advanced security skills and security operations experience.
Track: Network Administration

Common Security Tools to Protect Your On-Prem and O365 Environment

May 5 - 11:30 AM to 12:30 PM
Presenter: Michael Briganti

In this presentation, Mike will deep dive common tools/strategies to harden your environment to sleep better at night. Nowadays, IT staff must be aware of O365 security in addition to On-Prem.

Audience Level: Expert
Audience Knowledge:
Track: System Administration

Connect the Dots: Measuring, Evaluating and Resolving Technology Support Woes

May 5 - 9:00 AM to 10:00 AM
Presenter: Bruce Sarte

Supporting the technology within our schools is an ever-changing and moving target. Technology departments are constantly asked to do more things with fewer resources and are still expected to deliver the same high quality of support. How do we begin to deliver a high quality of support and then maintain that support level when the financial, technical and human resources continue to shrink?

In this session, we will investigate how to approach the idea of delivering support, how to monitor and measure the support that is being offered and strategies to remedy the situation when we are not delivering the support necessary. We will talk about different strategies to collect information on problems that exist, methods to assess technical problems to find the right resources to deliver a solution and how to assess how well we are doing at each of those things in a meaningful and actionable way.

Attendees will leave this session with information and strategies that will allow them to consider different ways to improve their support infrastructure within their organizations.

Audience Level: Intermediate
Audience Knowledge: Knowledge and awareness of the IT user support experience.
Track: Technology Leadership

Cybersecurity Best Practices and Federally Funded Resources That Can Help

May 5 - 2:00 PM to 3:00 PM
Presenter: Kyle Bryans

There are countless frameworks and individual best practices that people leverage to better their cybersecurity posture, but searching for resources to assist you can be overwhelming. This presentation will align some no-cost resources available from the MS-ISAC, DHS, NCSA, and other partners to some key best practices so you can get started in implementation right away!

Audience Level: Intermediate
Audience Knowledge: Exposure to federally funded programs to help strengthen your school districts cyber posture.
Track: Network Administration

Data Science of Your District

May 5 - 10:30 AM to 11:30 AM
Presenter: Jason Murray

Visualize your District data. Leverage your already collected data to better understand District change and discover new patterns and trends hidden inside your data lake. We will discuss ways of interpreting data trends in student information systems, PIMS template uploads and other systems within your district. This presentation will unlock a new way of representing data and provide a more vivid image of patterns within your district.

Audience Level: Novice
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Defense in Depth – How Council Rock is Implementing the 20 Critical Controls of Cyber Security

May 6 - 1:30 PM to 2:30 PM
Presenter: Matthew Frederickson

In this presentation, you will learn how Council Rock School District has adopted the 20 Critical Controls of Cyber Security and more importantly, what tools they are using to ensure a defense-in-depth approach. This presentation will cover all aspects of the 20 Critical controls and will be broken down by domain: endpoint protection; network protection; user account protection and systems protection. Additionally, this presentation will cover the steps being taken to ensure swift recovery in the event of a ransomware attack or other serious disruption to service.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Define Insanity: Replacing Your SIS

May 5 - 10:30 AM to 12:30 PM
Presenter: Mike Graham
Presenter: Tim McCormick

Thinking about changing your SIS? Listen to two districts' recent experiences with changing student information systems. Your last SIS change may have been before PIMS, learning management systems, and electronic IEPs. There are so many things to consider today when changing out the most critical application in your district. Where do you begin?

Audience Level: Intermediate
Audience Knowledge: big picture understanding of everything an SIS impacts
Track: Technology Leadership

Demystifying VoIP: Building your IP PBX Hands-On Session

May 11 - 10:30 AM to 12:00 PM
Presenter: Michael DeBakey

Join us for an introductory hands-on session where we will build an IP PBX from scratch using the SipX open-source framework. We will weigh the pros and cons of VoIP, examine how to prepare your environment for packetized voice applications, and provision live telephone endpoints on the platform.

Audience Level: All
Audience Knowledge: Prior experience configuring network infrastructure is not required, though it is always helpful to have.
Track: Network Administration

Desktop Support 101

May 4 - 10:30 AM to 12:00 PM
Presenter: Brian Steigauf
Presenter: Jared Gaul

Tips and Tricks everyday Desktop Support should know.
Including LDP binds, WinDirStat, CMD commands

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: Desktop Support

Developing a Comprehensive IT Security Strategy

May 6 - 1:30 PM to 2:30 PM
Presenter: Mike Graham

This presentation will walk through the Center for Internet Security's Control methodology for securing IT assets and information. The CIS Control framework provides a great starting point for anyone looking to improve IT security in their organization but who do not know where to begin. We will talk about all aspects of security, ranging from hardware and software configurations to networks, data, and information assets. Participants will leave with a free set of tools to asses where their organization is currently operating and what their next steps should be to improve their overall IT security strategy.

Audience Level: Novice
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

eSports in Schools Round Table Discussion

May 5 - 3:30 PM to 4:30 PM
Presenter: Chadwick Whenry

Join us in a round table discussion around eSports in Education. Come prepared to learn about others experiences and share your experiences and thoughts around the subject.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed
Track: Desktop Support

FileWave Streamlined Endpoint Mgt. (macOS, Windows, iOS, Android, & ChromeOS)

May 5 - 3:30 PM to 2:30 PM
Presenter: Jonathan Kane

FileWave SE, Jonathan Kane shares our multi-platform endpoint management. For over 27 years, FileWave has continued to provide systems, and MDM software to empower IT teams through the lifecycle process of imaging, deployment, management, tracking and maintenance. Our highly scalable software solves the many challenges of managing a diverse and growing population of users, devices, and content by ensuring IT teams have a comprehensive solution that supports both clients (desktops/laptops) across Windows, macOS, iOS, Android, and ChromeOS platforms.

Includes; granular file-level deployment for macOS/Windows along with self-healing, patch management, scheduling tool, kiosk, assets/custom inventory, dashboard, license management and usage/reporting & location tracking.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Free Student-Led Repair Center/Self-Maintainer Software

May 6 - 8:30 AM to 9:30 AM
Presenter: Megan Lokuta

Vivacity Tech is the first Public Benefit Corporation to provide technology to schools. Due to our mission-driven nature, we are giving away the most robust Asset Management/Student Led Repair Center/Self Maintainer on the market.
Join us in this presentation to receive a live demo of the software and collaborate with peers feedback and suggestions on best practices for running your internal repair programs. Feedback received in this session will go directly back to Vivacity Tech engineers to immediately bolster the software and build in feature requests made during the session.

We're determined to help school districts nationwide receive the most out of their technology, and your input will help shape tech departments everywhere.

Attendees will also receive a FREE Vivacity Tech Laptop/Tablet case of their choice!

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Getting the Word Out!

May 5 - 9:00 AM to 10:00 AM
Presenter: Susan Hoffman

Desktop Support can be a wild, wacky, and challenging task on the best of days. One never knows what the day will bring, and the variety of problems, personalities, and predicaments can sometimes seem overwhelming. One way to avert some of the daily chaos is to be proactive and get information out to users who are willing to help themselves. How you make an impression varies with your institution, but you can start with a few basics. This presentation will discuss how you get the word out to your users: What does your user need to know? What are the best forms of outreach--email, social media, websites, tip sheets, newsletters, posters? Who are you trying to reach--staff, students, parents? How do you create useful media to share? Where do you get ideas? What tips are best not shared? How do you catch your user’s attention amidst the daily tumult of competing information? I will present my strategies and ideas and encourage attendees to share what works for them.

Audience Level: Intermediate
Audience Knowledge:
Track: Desktop Support

Harnessing the Power of Apprenticeship to Bridge the Cybersecurity Workforce Gap

May 6 - 10:00 AM to 11:00 AM
Presenter: Paige Thompson

The word “apprenticeship” is in the national zeitgeist for a reason. The combination of a Presidential Executive Order, government support, and business leaders’ recognition that paid, standardized training programs cultivate expert talent has led to increased apprenticeship programs across the country. The presentation will specifically show how cybersecurity is moving forward and succeeding in helping new candidates enter their occupations using apprenticeships as a foothold. By leveraging apprenticeship as a method to accelerate education, credentialing, and ultimate employment, the industry will create new and cost-effective avenues toward bridging the workforce gap for a much broader population of Americans. Purdue University’s Cyber Apprenticeship Program (P-CAP), is one avenue toward implementing a successful cyber apprenticeship program, and the presentation will discuss its work with its employer network, bringing in specific case studies. P-CAP blends the traditional models, creating a new way to earn-and-learn for the 21st century. In the program, apprentices can earn an AAS or BS degree while employed in their field of study, gaining simultaneous on-the-job training and mentorship. The program is unique—it is the first apprenticeship in the country to ever offer a bachelor’s degree as part of its program. Using the apprenticeship model, employers can add another passageway to obtain talent by allowing them to grow their own cyber professionals, establish a pathway for individuals to enter the pipeline and advance others in a high-demand position.
Learning Objectives:
1. Learn about a new strategy for filling an employer’s pipeline for cybersecurity talent.
2. Learn about strategies for attracting women and people of color to cybersecurity careers.
3. Overview of current methods of educating cybersecurity professionals.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Hidden in Plain Sight: Developing Use Cases That Nefariously Utilize Twitter’s API For The Purpose of Building Covert Communications

May 5 - 11:30 AM to 12:30 PM
Presenter: Kyle Petty
Presenter: Ali Alamri
Presenter: Mohammed Alshehri

With over 182 billion Tweets being produced by approximately 330 million accounts on Twitter's social media platform just this year in 2019, each account is crafting approximately 552 Tweets. Due to the large volume of traffic and Tweets on this platform, it is a suitable candidate for creating a covert channel that is hidden in plain sight; thus, allowing for covert communications to exist. The paper discussed in this session and written by the speakers, defines a covert channel as being any type and all forms of communications that are hidden and communicate surreptitiously between the different endpoints. By exploiting Twitter's APIs, the channel utilizing two use cases: a malware use case and a command and control server design use case. These two use cases have been implemented to send covert messages, execute commands remotely, and ex-filtrate data through an account's user profile page being scraped, parsed, and interpreted. Allowing ambiguity to be established in both use cases in a social media environment where communication between the different hosts would eliminate suspicion and mitigate the risk of detection.

Audience Level: Intermediate
Audience Knowledge: Technology background may help, but not needed.
Track: Network Administration

How to expand your Data Center in Unlikely Spaces

May 4 - 3:00 PM to 4:30 PM
Presenter: Nick Babiak
Presenter: Alan Sutter

Franklin and Marshall was running out of power and cooling capacity in their current data center. Expanding was necessary, but finding the space to do it was at a premium. DVL Group provided equipment and installation services to make this project possible in an area that was mainly used for equipment storage and old telecommunications equipment. The system deployed helped save on architectural and renovation costs that would otherwise be associated with building a new data center.

Audience Level: Intermediate
Audience Knowledge: Attendees should be familiar with data center power and cooling infrastructure and their basic purposes
Track: Network Administration

Improving Your End User Support Model

May 5 - 2:00 PM to 4:00 PM
Presenter: Nate Moss

The importance of great IT support is often underappreciated, and regardless of how well established an IT department is, there is always room to improve. In this session, we will have a philosophical conversation about how to leverage every interaction with end-users to improve the confidence that end users have in their technology and in you. Teachers have unique concerns and needs from a technology perspective, and gaining their respect can go a long way in being able to offer a higher level of support. I will share my 'seven rules' for end-user interactions, and discuss how to make effective use of each 'rule'.

Audience Level: Novice
Audience Knowledge: No prior experience on this topic is needed.
Track: Desktop Support

Intro to Active Directory

May 6 - 8:30 AM to 9:30 AM
Presenter: Dave Light
Presenter: Jared Gaul

In this hands-on session we will go over basic Active Directory management. Topics will include items such as creating and managing organizational unit structures, user & computer objects, resource accounts, and security groups. We will look at the how and why resource accounts are used, the different security group options, and how group policy deployment works based on your OU structure. We will have a working lab of 15 laptops set up with an individual test domain for attendees to use as part of the session.

Audience Level: Novice
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Is Your 1:1 Technology Budget Unpredictable? Discover Solutions That Help You Plan Your Spend and Avoid Unforeseen Expenses.

May 5 - 9:00 AM to 10:00 AM
Presenter: Eric Ogden

This session will share industry best practices on planning your 1to1 spend. In addition, attendees will discover ways to better control the expense of maintaining their technology.

Audience Level: Novice
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Keynote Address

May 4 - 9:00 AM to 10:00 AM

Keynote Address

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: Keynote

Leadership Administration/E-Rate Round Table Discussion

May 5 - 3:30 PM to 4:30 PM
Presenter: John Windhausen

Congress and the Trump Administration are considering significant reforms to US Broadband policy. Congress will be considering a broad-based infrastructure bill that could provide billions of dollars to fund new broadband deployment and adoption strategies.

The FCC had made significant changes to the E-Rate program for Category 2 purchases. These changes will begin in Fiscal Year 2021. Dark fiber has thus far remained on the eligible services list and is a cost-effective way to provide high bandwidth connections to schools in many circumstances.

Join the round table discussion these subjects and related policy making issues for schools.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Leading Geeks: How to Manage and Lead People who Deliver Technology

May 4 - 1:00 PM to 2:30 PM
Presenter: Paul Glen

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Leading Geeks: How to Manage and Lead People who Deliver Technology – Continued

May 4 - 3:00 PM to 4:30 PM
Presenter: Paul Glen

Audience Level: All
Audience Knowledge:
Track: Technology Leadership

Legal Issues Surrounding eSports

May 4 - 1:00 PM to 2:30 PM
Presenter: Mark Cheramie Walz

This session addresses legal issues arising from the proliferation of eSports in public education. Specific topics include user agreements, age restrictions, parent permission issues, home/school boundaries, Title IX, managing online communication forums, COPPA, and CIPA.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Legal Ramifications of Social Media Search and Scanning Services

May 4 - 3:00 PM to 4:30 PM
Presenter: Mark Cheramie Walz

This session addresses the positives, negatives, and potential legal concerns of social media scanning and searching services. The session will cover potential district liability for missed suicide threats, online bullying, threats of violence, and the efficacy of these new services to reduce such liability. This session includes a review of lawsuits against school districts for online conduct

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Let’s Talk About Hardware

May 5 - 2:00 PM to 3:00 PM
Presenter: Matthew Ferro

Hardware is important, it's the foundation of everything in Technology and our daily lives. This session will hopefully give you a better understanding of the hardware we use every day. I'll touch on solid-state storage, desktop, server-grade processors, VR equipment, graphics cards, and proper terminology to make you sound like an expert. I'll start at the most basic level and then drill down to more advanced architecture. This session should give you a greater grasp on hardware and allow you to make smarter purchasing decisions when it comes to infrastructure upgrades, computer lab refreshes, e-sports programs, and VR lab build-outs.

Audience Level: All
Audience Knowledge: No skills necessary, just a love of hardware.
Track: System Administration

Let’s Talk Phishing

May 6 - 10:00 AM to 11:00 AM
Presenter: Andrew Sanders

Phishing attacks are the number one method for attackers to gain access to systems. Unfortunately, the methods phishers use are ever-evolving. What do you do when someone has fallen for a phishing attempt? Do you know what type of phishing emails you are receiving? Let’s talk about what we can do to help minimize phishing emails by using SPF, DMARC, & DKIM. Then let’s talk about what processes and techniques can be used to help stop the spread of a phishing attempt. Most importantly, how do we educate our staff to identify phishing attempts.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Live Streaming and Multi-Camera Production

May 5 - 2:00 PM to 3:00 PM
Presenter: Joshua Wakefield

We are living in an era of content creators! YouTubers all over the world are creating content in their bedrooms and reaching audiences of millions. As school districts begin to adopt YouTube and live-streaming solutions of their own, it can be overwhelming deciding where to begin! Multi-Camera live-streaming production doesn't have to costs tens of thousands of dollars! Join me, as we discuss my district's journey from a single camera streaming solution to a robust multi-camera production. We will demo some hardware, talk about single-camera vs. multi-camera production, Switchers, cost expectations and more! If you currently are not streaming your sporting events and ceremonies online, after this session you will be!

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Maintenance Costs of a Self-Provisioned Network

May 6 - 11:00 AM to 12:00 PM
Presenter: Deron Leight
Presenter: Jim Van Dyke

In 2005, Upper Adams School District (UASD) deployed a 9+ mile self- provisioned fiber-optic network. This presentation will provide a nearly 15-year case study in the service and maintenance requirements of a self-provisioned network. Initial costs and savings will be explored in conjunction with budgeted maintenance costs compared to actual costs spent in the 15-year time frame. As future maintenance costs are often unpredictable, and often, a grave concern for those contemplating a self-provisioned network, this case study will provide real-world examples to identify those issues and discuss the cost effects that are associated with them

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Managing Facilities with Microsoft Power Automate (Flow)

May 5 - 10:30 AM to 11:30 AM
Presenter: Nick Wagner
Presenter: Sean Garman

See how Ephrata Area School District moved away from paper facilities to a digital system using Microsoft Power Automate formally known as Flow. We will discuss and show reasons as to why we changed and the complications that came with it.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: Network Administration

Microsoft Autopilot and Intune Management

May 5 - 10:30 AM to 11:30 AM
Presenter: Jeremy Wagner

IU 13 has begun using Intune and Autopilot for device management. Moving to Intune and Azure AD for device management generated a lot of questions. We will lay out what we experienced in our process, what questions we encountered, solutions to those questions, and how to help the user transition to the online experience from a helpdesk perspective.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: Desktop Support

Network Administration Round Table Discussion

May 5 - 3:30 PM to 4:30 PM
Presenter: Roy Hoover

Come discuss ideas to improve management of your network. How do others do it? What tools work well in a K12 environment with limited resources? How do you gain the visibility into the important data points on network performance without being overwhelmed with useless data? Share your stories, successes, and failures.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed
Track: Network Administration

Network Based Video Surveillance and Access Control

May 4 - 10:30 AM to 12:00 PM
Presenter: Dan Fritsch

Network-based video surveillance and access control solutions are less costly, easier to use & maintain, and collect vastly more data and higher quality images than traditional analog systems. App-Techs will demo the latest in networked-based security technology, including digital IP network cameras, access control, intercoms, audio devices, strobes, and more. Topics will also include the emergence of Artificial Intelligence-based analytics as a tool for automating security monitoring, the importance of devices that are easy to use and manage, and the ways in which network-based devices can be connected to a centrally-managed security network. App-Techs specializes in design, installation, support and maintenance of video surveillance systems, access control, industrial wireless and fiber-optic networks. The company also develops software integrations between Milestone XProtect and third-party security products.

Audience Level: All
Audience Knowledge:
Track: System Administration

Nutanix Real Life Experience

May 5 - 10:30 AM to 11:30 AM
Presenter: Greg DeShong
Presenter: Ed Keiper

In this presentation, we will discuss how Owen J Roberts School District migrated from a traditional SAN and VMware based host environment to a Nutanix hyper-converged solution. We will take a look at the ease of Nutanix installation process, introduce Prism Element / Prism Central, look at a live environment, and finish with Q&A.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Office 365 Tips and Tricks

May 5 - 11:30 AM to 12:30 PM
Presenter: Dave Light

In this session, we will look at tips and tricks for Office 365. We will also dive into features and apps that maybe you didn't know existed. We'll look at some of these apps and what they can be used for so that you are getting the most out of your Office 365 Suite.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Preparing for macOS Catalina: How to Survive on the Island

May 5 - 9:00 AM to 10:00 AM
Presenter: Tim McCleary

Each version of macOS further secures the system and seemingly makes it more difficult to deploy and manage with the tools we have at our disposal. In this presentation, we will look at the challenges of deploying Catalina, how to handle them, and what planning you should be doing now to prepare.

Audience Level: Novice
Audience Knowledge: None
Track: System Administration

PRINTERS – The Cyber Threat You’d Never Expect

May 6 - 1:30 PM to 2:30 PM
Presenter: Jay Brown

When most people think about network security, they think firewalls. However, there is another threat in your office that may be exposing your organization to a host of risks. Have you ever thought about what devices besides computers have memory, processors and operating systems? Without the proper safeguards, there is one in particular that makes so many businesses vulnerable, and they don’t even know it – your printers. Join us for a manufacturer agnostic look at the risks, threats, and vulnerabilities facing organizations just like yours from your least suspicious devices. We will also discuss industry trends and best practices for a smarter approach to fleet security management.

Audience Level: Intermediate
Audience Knowledge: Benefits most individuals with roles, responsibilities, or interest in endpoint and network security, data privacy, and regulatory compliance.
Track: System Administration

Ransomware – An RGE or Learning Experience?

May 6 - 8:30 AM to 9:30 AM
Presenter: Matthew Frederickson

If you are planning your cyber security effort based on the idea of preventing, you are leveraging yourself for failure - a true Resume Generating Event (RGE). Ninety-one percent of network breaches last year occurred through phishing - someone clicked on a link they knew they shouldn't.

What you do NOW with the assumption you WILL BE hacked, matters in terms of recovery and business continuity.

This session will walk through the most likely attack vectors, how the attack occurs; the damage it does, and the steps you need to take now to recover swiftly.

Audience Level: Novice
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Ransomware Defense 101.crypto

May 4 - 10:30 AM to 12:00 PM
Presenter: Dan Lezoche

Ransomware is a major disruptive threat that can severely impact our operations in the education sector. Attendees of this session will hear real-world stories of Ransomware survival and learn best-practices to protect themselves from becoming the latest victim organization. This session will leverage the excellent documentation from CISecurity's "20 Critical Controls" version 7.1 as a guide towards hardening your district's security footprint.

Audience Level: Intermediate
Audience Knowledge: Attendees should have a broad range of familiarity and/or control over network access, network topology, Active Directory, server operating systems, client operating systems, patching strategies, antivirus, logging, backup, firewall, and general security awareness.
Track: System Administration

Ransomware Resiliency, Recoverability and Availability with Veeam

May 6 - 10:00 AM to 11:00 AM
Presenter: Bruce Pellegrino

Ransomware continues as a mainstream threat. Learn how Veeam provides businesses the confidence that their data will be available and recoverable by ensuring they have the right recovery solutions in place. See a live demonstration of a Ransomware attack and recovery using Veeam Backup and Replication.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Securing the Network – It’s More Than Just Antivirus

May 6 - 8:30 AM to 9:30 AM
Presenter: Austin Lawrence

Securing today's networks properly takes a variety of skills, the proper resources/equipment, and a healthy amount of patience to pull off - not just your friendly neighborhood antivirus.

In this presentation, we will run through the different layers of network/security architecture to help improve your network's security. Today's most effective security tools aren't always the big shiny expensive ones. We will review some open source tools to help improve your security posture as well as paid ones. Some tools you probably already have (built into your existing network gear)!

Topics presented:
-Network Architecture - Building a secure foundation
-Security through segmentation - Defining network boundaries
-Visibility - Security is all about what you can see and finding what you can't
-Access Control - Did someone say free NAC?

Audience Level: Expert
Audience Knowledge: Familiarity with network security protocols/methods-Basic knowledge of network architecture -An understanding of network monitoring tools/protocols -Familiarity with modern day IT security threats
Track: Network Administration

Securing the Network – It’s More Than Just Antivirus Cont.

May 6 - 10:00 AM to 11:00 AM
Presenter: Austin Lawrence

Securing today's networks properly takes a variety of skills, the proper resources/equipment, and a healthy amount of patience to pull off - not just your friendly neighborhood antivirus.

In this presentation, we will run through the different layers of network/security architecture to help improve your network's security. Today's most effective security tools aren't always the big shiny expensive ones. We will review some open source tools to help improve your security posture as well as paid ones. Some tools you probably already have (built into your existing network gear)!

Topics presented:
-Network Architecture - Building a secure foundation
-Security through segmentation - Defining network boundaries
-Visibility - Security is all about what you can see and finding what you can't
-Access Control - Did someone say free NAC?

Audience Level: Expert
Audience Knowledge: Familiarity with network security protocols/methods -Basic knowledge of network architecture -An understanding of network monitoring monitoring tools/protocols -Familiarity with modern day IT security threats
Track: Network Administration

Security Camera/Camera Software Round Table with Will

May 5 - 3:30 PM to 4:30 PM
Presenter: Will Kline

I’m interested in what software / hardware others are implementing, what steps have been taken to conquer that weird security configuration, as well as suggestions on how to improve upon devices already in place in a casual setting.
I’m hoping to have the odd questions answered that Google couldn’t, without judgements passed.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Streamlining ID Card Technology: Upgrading to Mobile Technology for College Life at Millersville

May 5 - 9:00 AM to 10:00 AM
Presenter: Ben Kling

In this session, Ben Kling will lead you through an overview of ID card technology currently in use at Millersville University, as well as looking ahead to upcoming innovations in transforming old ID cards into a mobile technology. Focus topics will include benefits and challenges to converting swipe id technology to a mobile platform, considerations for different types of credentials, and system integration.

Audience Level: Novice
Audience Knowledge: No prior experience on this topic is needed.
Track: Network Administration

Student Safety: Driving Change Through Data

May 6 - 1:30 PM to 2:30 PM
Presenter: Michael Boggess

Education is increasingly going digital, and schools need a trusted solution to help maintain COPPA compliance and Student Data Privacy Standards. In this session, you will learn how ed-tech leaders across the globe are maximizing their technology budgets with data analytics, maintaining compliance, and effortlessly solving SSL decryption with Lightspeed Systems Smart Agent technology in Relay, and in improving data security and privacy in a cloud-based platform.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

System Administration Round Table Discussion

May 5 - 3:30 PM to 4:30 PM
Presenter: Jared Gaul

Open discussion on topics related to systems administration. This moderated round table discussion will be user-driven and can cover virtualization, storage technologies, and software that may be helpful in the day-to-day K-12 operations.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed
Track: Desktop Support

Taking Advantage of Student Devices for Whole Group Instruction, Individual Study and Collaborative Applications

May 6 - 11:00 AM to 12:00 PM
Presenter: Heather Schrader

Student devices are becoming more and more ubiquitous in the classroom. Teachers need to utilize a variety of pedagogies and classroom management tactics to keep students engaged, differentiate instruction, and help students master content and concepts while also helping them to grow and develop socially and emotionally. With SMART Learning Suite's new online environment, teachers can transform their static content into interactive and engaging lessons. Then, SMART Learning Suite allows teachers to utilize the student devices in their classroom for whole-class instruction, small group rotations, self-paced learning time, and collaborative projects. How? Join the presentation, and you'll experience how flexible and powerful SMART Learning Suite can be--and how your teachers can leverage it to take advantage of student devices.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

The Security and Cost Benefits of SOC-as-a-Service

May 5 - 9:00 AM to 10:00 AM
Presenter: Mark Finlayson
Presenter: Nick Pier

Schools operate under constant cyberattack. Cybercriminals of every type continually launch ransomware, viruses, phishing, and denial-of-service attacks that threaten your computer systems and network infrastructure. That puts your IT and security teams always on defense, without the time and expertise to proactively detect and respond to advanced threats. And when you are on defense, just a single mistake can lead to devastating results.

SOC-as-a-service delivers comprehensive, end-to-end security for organizations on limited budgets. It enables you to outsource your needs while enjoying the benefits of a security service focused on threat detection and incident response. Plus, it’s an affordable alternative for many organizations since it doesn’t require investment in additional hardware, software, or staff. Easy to deploy and manage, it offers the people, process, and technology needed for running a SOC. During this presentation, we will demonstrate how SOC-as-a-service can be utilized to protect your school from cyberattacks and rapidly respond to incidents when they occur.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed
Track: Technology Leadership

Using Python with Excel

May 4 - 10:30 AM to 12:00 PM
Presenter: Brian Farkas

Python is a powerful language with a vast set of libraries. In this session, we will explore a library used to manipulate Excel files. Using openpyxl, we will learn how to read, write, and format these Excel files directly from our Python scripts. We will also touch on using the openpyxl library to create graphs from our data and how to validate the data contained within our spreadsheets.

Audience Level: All
Audience Knowledge: Some knowledge of Python
Track: System Administration

Video Analytics and Integration with Milestone XProtect

May 5 - 10:30 AM to 11:30 AM
Presenter: Paul Dillon

Technology improvements and falling prices have made cutting-edge video analytics tools, based on Artificial Intelligence (AI), accessible to small- and mid-sized enterprises. Video analytics has the potential to drastically reduce the time and resources spent watching and waiting for something to happen or searching through long segments of video.

This session will demo how video analytics can be added to a Milestone XProtect camera network to boost monitoring capabilities, improve efficiency, and reduce operating costs. App-Techs will also showcase how automated monitoring with analytics can be used to trigger a real-time security response across many types of devices, including PTZ cameras, access control devices, audio speakers, strobes, PA/phones, and other third-party systems. App-Techs specializes in the design, installation, support, and maintenance of video surveillance systems, access control, industrial wireless, and fiber-optic networks. The company also develops software integrations between Milestone XProtect and third-party security products.

Audience Level: All
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

Video Analytics as a Multiplier in Student Safety and Valuable Administrative Time

May 6 - 10:00 AM to 11:00 AM
Presenter: Jeremiah Main

With only 180 days to impact the education of our students each year, the last thing we need is them to be distracted or absent because of fear. Learn how advancements in computer learning impact the video surveillance world in ways that improve your overall safety environment as well as return time back to the staff who handle incidents allowing them to focus more on teaching and enabling learning.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

What’s a Tech Director to Do?

May 6 - 8:30 AM to 9:30 AM
Presenter: Randy McNally

In this presentation, we will cover the tasks involved in being a Technology Director. What should be prioritized, what is necessary, what is critical, what is nice to have? This journey along with audience participation will develop a road map ("Waze") for Tech Directors. We will look at various constraints on various items for consideration. Things such as budgets, politics, and trends (educational and technological) will be discussed.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: Technology Leadership

Wireshark Hands-On

May 5 - 2:00 PM to 3:00 PM
Presenter: Roy Hoover

This session will introduce you to Wireshark, a free and open-source packet analyzer. Topics will include why it is important to learn how to utilize tools such as Wireshark and how it can help you and your organization troubleshoot networking problems.

Audience Level: All
Audience Knowledge:
Track: Network Administration

You Have Been Compromised!

May 4 - 10:30 AM to 12:00 PM
Presenter: Keith Kapp

Through the sharing of real-life experiences, this session will focus on providing a glimpse into what happens when you know that your school district's network and/or data have been compromised. We will discuss the decisions that need to be made quickly, the action steps that need to be taken, and the people who need to be informed, all of which can quickly begin to feel overwhelming. Our goal is to help you to ensure that you have the proper policies, procedures, and processes in place to help guide you through these incidents, to help you return to business as usual as quickly as possible, and to help you restore confidence in the integrity of your network and data while simultaneously ensuring your stakeholders also feel that same level of confidence.

Audience Level: Intermediate
Audience Knowledge: No prior experience on this topic is needed.
Track: System Administration

CONTACT

Tech Talk Live is the only conference of its kind in the region specifically designed for IT pros in education.


techtalklive@iu13.org

1020 New Holland Avenue
Lancaster, PA 17601

(717) 606-1770