Security

Introduction to the Collective Intelligence Framework

Presenter(s): 
Beth Young - REN-ISAC

Information sharing is hard! It seems counter-intuitive, if you have data that you want to share, you can just give it to another person, right? But so many other things have to happen when sharing a mass of data from many different sources. The Collective Intelligence Framework (CIF) was created to solve that data sharing problem. Come learn about the history of data sharing, CIF and how the REN-ISAC has solved the data sharing conundrum. Yo too can start using and sharing real time threat/attack data!

Schedule info

Room: 
Room 64

Securing School Facilities

Presenter(s): 
Stan Taber - Sherwood-Cass R-VIII
Buddy Mason - American Digital Security

A few tips to ensure your school buildings are safe and secure: Require all visitors to buildings to check-in at building offices. Prevent unauthorized entry of people (non-custodial parents, intruders etc.), into school buidings by installing a mega-pixel audio/visual entry system at the main entry door of each building. Reduce bullying through strategic placement of mega-pixel video cameras. Control who is entering school buildings through a card access system. Prevent vandalism/theft of district assets through the effective use of mega-pixel video security cameras.

Schedule info

Room: 
Parasol II

Benefits of Running Cacti Monitoring

Presenter(s): 
Weston George - Monett Schools
Travis Reddick - MOREnet

Using Cacti to monitor and troubleshoot your network proactively.

Slides: 

Schedule info

Room: 
Room 64

Will You Be My Friend? The Practical and Legal Aspects of Teachers Friending Students on Facebook

Presenter(s): 
Scott Summers - MSBA Attorney

Teachers in Missouri have the ability to "friend" their current and former students on Facebook. But, given the potentially harmful consequences of doing this, should they?

This session will explore the practical and legal realities of school staff members communicating and "friending" their students and will also examine the best way school personal can utilize social media to best serve the educational needs of their students.

Schedule info

Room: 
Redbud

Securing Windows Computers From an Attack

Presenter(s): 
Derek Melber - BrainCore

This session will discuss some of the more common ways that Windows computers are attacked, the passwords are obtained and password hashes are compromised. Then, we will go through a punchlist of settings (mostly Group Policy), which can be leveraged to reduce the overall risk associated with these attacks. There are also common procedures that can be followed to reduce the attack surface for these and many other attacks.

Schedule info

Room: 
Salon A

How to remove the target

Presenter(s): 
Theresa Frommel - MOREnet

Who is a target for scams and what are the common tricks? Attendees of this session will learn basics about today’s most common electronic threats against end users and how to protect themselves and their organization.

Schedule info

Room: 
62/63

Welcome to 1996! DDoS in the modern age

Presenter(s): 
Beth Young - REN-ISAC

"Those who cannot remember the past are condemned to repeat it"? George Santayana. In 1996, organizations were advised to turn off services like chargen and echo because those ports were being used in denial of services attacks. Jump to 2013 and those ports are still being used for malicious purposes. We will talk about current attack trends and how you might be contributing to current attacks. We will also give advice on turning off unneeded services.

Schedule info

Room: 
62/63

Patti's Security Toolbox **Lab/BYOD**

Presenter(s): 
Patti Dudenhoeffer - MOREnet

Patti’s Security Toolbox – In this session, I’ll show you some of my favorite security tools – where to find them, why I use them, what they look like, and how they work.

Schedule info

Room: 
Parasol II

Securing your Windows Environment using Security Compliance Manager

Presenter(s): 
Jim Long - MOREnet
Stacy Vaccaro - State of Maryland

Deploying and maintaining security settings across all systems in the organization has always been a  challenge for IT staff.  Using the free Microsoft Security Compliance Manager you can now easily deploy Policies to all your systems to secure teh OS, Office or other Microsoft application whether they are in the domain or stand alone systems.

Schedule info

Room: 
Room 76/77

How Untangle Saved My Bacon

Presenter(s): 
Brad Jones - King City R-I

How to build a firewall solution on limited time and equipment.   Untangle is an open source, ISO based scalable firewall and filter solution with many added features depending on need and budget.

Schedule info

Room: 
62/63
Syndicate content