By Track: Information Security
TUTORIAL: Network Automation (Separate Registration Required)
Room Borgne (3rd)
Speakers Karl Newell
Primary track Advanced Networking
Secondary tracks Information Security
08:00AM-05:00PM
WORKSHOP: Cloud Security 101 (Separate Registration Required)
Room Grand Chenier (5th)
Speakers Nicholas Lewis Shannon Roddy Sean O'Brien Sara Jeanes
Primary track Cloud Architecture
Secondary tracks Information Security
08:30AM-11:30AM
WORKSHOP: I’m the Expert, Why Won’t You Listen to Me? (Separate Registration Required)
Room Grand Couteau (5th)
Speakers Gail Krovitz Eric Adams
Primary track Research Engagement
Secondary tracks Information Security
08:30AM-11:30AM
TUTORIAL: GÉANT Shibboleth IdP OIDC Plugin (Separate Registration Required)
Room Napoleon Ballroom A1 (3rd)
Speakers Henri Mikkonen Arto Tuomi
Primary track InCommon
Secondary tracks Information Security
08:30AM-04:30PM
TUTORIAL: Secure Coding Practices & Automated Assessment Tools (Separate Registration Required)
Room Rampart (5th)
Speakers Elisa Heymann Barton Miller
Primary track Information Security
08:30AM-04:30PM
TUTORIAL: Learning the Art of Feedback by Watching Gordon Ramsay (Separate Registration Required)
Room Grand Couteau (5th)
Speakers Jacob Farmer
Primary track Information Security
01:30PM-04:30PM
After the Incident: Lessons Learned
Room Nottoway (4th)
Speakers Michael Grinnell
Primary track Information Security
09:00AM-09:50AM
Passwordless Authentication with Shibboleth and WebAuthn
Room Oak Alley (4th)
Speakers Shilen Patel Mary McKee
Primary track InCommon
Secondary tracks Information Security
09:00AM-09:50AM
Identity and Access Management Hackathon
Room Endymion/Mid City/Proteus (8th)
Primary track InCommon
Secondary tracks Information Security
09:00AM-05:00PM
Policy Enforcement/NGFW via Multi-Hundred Gigabit Infrastructure
Room Nottoway (4th)
Speakers Jason Sullivan
Primary track Information Security
Secondary tracks Advanced Networking
10:20AM-11:10AM
Credential Threat Intelligence and Mitigation
Room Nottoway (4th)
Speakers Kim Milford
Primary track Information Security
Secondary tracks InCommon
11:20AM-12:10PM
DDoS Working Group
Room Maurepas (3rd)
Primary track Information Security
Secondary tracks Advanced Networking
12:30PM-01:30PM
Duo Security Special Interest Group
Room Napoleon Ballroom D2 (3rd)
Speakers Nicholas Lewis
Primary track Information Security
12:30PM-01:30PM
Bringing Law and Order to Google Cloud Platform: Securing your GCP Organization
Room Grand Chenier (5th)
Speakers Bob Flynn
Primary track Cloud Architecture
Secondary tracks Information Security
01:40PM-02:30PM
OmniSOC: One Year of Helping Secure Higher Education
Room Nottoway (4th)
Speakers Charles Kloote
Primary track Information Security
01:40PM-02:30PM
Security Operations Plan: Duke University’s Approach to Cloud Security
Room Grand Chenier (5th)
Speakers Glenn Setliff
Primary track Cloud Architecture
Secondary tracks Information Security
02:40PM-03:30PM
TIER Campus Success Program One Year Later
Room Oak Alley (4th)
Speakers William Thompson Ethan Kromhout Matthew Brookover Erik Coleman
Primary track InCommon
Secondary tracks Information Security
02:40PM-03:30PM
You're Good Enough, You're Smart Enough, and Gosh Darnit, We Like You
Room Nottoway (4th)
Speakers Michael Williams
Primary track Information Security
Secondary tracks Advanced Networking
02:40PM-03:30PM
MFA Usage in Higher Education
Room Napoleon Ballroom A3 (3rd)
Speakers Karen Herrington
Primary track Information Security
07:30AM-08:30AM
Experiences in Deploying and Using Consent & Notification
Room Oak Alley (4th)
Speakers Kenneth Klingenstein
Primary track InCommon
Secondary tracks Information Security
08:00AM-08:50AM
Protecting Your Routes and DNS Records
Speakers John Curran
Primary track Advanced Networking
Secondary tracks Information Security
08:30AM-08:50AM
perfSECURITY: The Intersection of perfSONAR and InfoSec
Room Nottoway (4th)
Speakers Mark Feit
Primary track Information Security
Secondary tracks Advanced Networking
08:30AM-09:00AM
Paranoid IAM: Process and Architecture
Room Oak Alley (4th)
Speakers Mary McKee Shilen Patel
Primary track InCommon
Secondary tracks Information Security
09:00AM-09:50AM
Past, Present & Future: Partly Cloudy with a Chance of Science
Room Nottoway (4th)
Speakers Michael Williams
Primary track Information Security
Secondary tracks Cloud Architecture
09:00AM-09:50AM
Safe or Performant? We Want Both!
Room Grand Chenier (5th)
Speakers Claudio Allocchio
Primary track Cloud Architecture
Secondary tracks Information Security
09:00AM-09:50AM
Identity and Access Management Hackathon
Room Endymion/Mid City/Proteus (8th)
Primary track InCommon
Secondary tracks Information Security
09:00AM-05:00PM
Need Better Cell Coverage? Build Your Own!
Speakers Walt Magnussen Ph.D.
Primary track Advanced Networking
Secondary tracks Information Security
10:20AM-10:40AM
Enabling Scalable Research Workflows Using the Globus IAM Platform
Room Grand Chenier (5th)
Speakers Vas Vasiliadis Rachana Ananthakrishnan
Primary track Cloud Architecture
Secondary tracks Information Security
10:20AM-11:10AM
Telephony Security: News From the Trenches
Room Nottoway (4th)
Speakers Andrew Gallo
Primary track Information Security
Secondary tracks Advanced Networking
10:20AM-11:10AM
Securing Hybrid Cloud & On-Prem Applications
Room Nottoway (4th)
Speakers Steven Wallace
Primary track Information Security
Secondary tracks Advanced Networking
11:20AM-12:10PM
Community and Industry Member Leadership Lunch (Invitation Only)
Room Borgne (3rd)
Primary track Advanced Networking
Secondary tracks Information Security
12:10PM-01:40PM
CAR "Interested Parties" BoF
Room Napoleon Ballroom D1 (3rd)
Speakers Rob Carter Kenneth Klingenstein
Primary track InCommon
Secondary tracks Information Security
12:30PM-01:30PM
Security Working Group
Room Napoleon Ballroom D2 (3rd)
Primary track Information Security
Secondary tracks Nothing But Net(working)
12:30PM-01:30PM
LastPass Usage at Georgetown
Room Nottoway (4th)
Speakers Noman Khan
Primary track Information Security
01:40PM-02:30PM
Cloudy With a Chance of Security: Be Sure to Pack Your Umbrella
Room Grand Chenier (5th)
Speakers Lisa Love
Primary track Cloud Architecture
Secondary tracks Information Security
02:40PM-03:30PM
Generating, Using, and Monitoring Threat Intel with REN-ISAC
Room Nottoway (4th)
Speakers Calvin Krzywiec Scott Finlon
Primary track Information Security
02:40PM-03:30PM
Network Border Infrastructure Security: Intelligence-based Threat Mitigation at Scale
Room Nottoway (4th)
Speakers Eric Boyd
Primary track Information Security
Secondary tracks Advanced Networking
04:00PM-04:20PM
RHEDcloud Project
Room Grand Chenier (5th)
Speakers Stephen Wheat
Primary track Cloud Architecture
Secondary tracks Information Security
04:00PM-04:50PM
eduVPN - a federated security-enhancement service for the R&E community
Room Nottoway (4th)
Speakers Tangui Coulouarn
Primary track Information Security
Secondary tracks InCommon
04:20PM-04:30PM
Improving Diffusion of RPKI within the Internet2 Community
Room Nottoway (4th)
Speakers Steven Wallace
Primary track Information Security
Secondary tracks Advanced Networking
04:30PM-04:40PM
The REN-ISAC Peer Assessment Service
Room Nottoway (4th)
Speakers Kim Milford
Primary track Information Security
Secondary tracks InCommon
04:40PM-05:00PM
State of the Art & Best Practices for Optical Network Self-Monitoring and Optimization
Room Napoleon Ballroom A2 (3rd)
Speakers Rodney Wilson
Primary track Advanced Networking
Secondary tracks Information Security
07:30AM-08:30AM
Timeout: Abusing the Network Label Stack
Room Nottoway (4th)
Speakers Karl Newell
Primary track Information Security
Secondary tracks Advanced Networking
08:30AM-09:00AM
Supporting IoT at Scale on Campus through Self-Service
Speakers Eric Boyd James Helzerman
Primary track Advanced Networking
Secondary tracks Information Security
08:50AM-09:00AM
Black Hole Routing
Room Nottoway (4th)
Speakers Michael Grinnell David Smith
Primary track Information Security
09:00AM-09:50AM
One Campus over MPLS
Speakers Wesley Allen Jason Murray
Primary track Advanced Networking
Secondary tracks Information Security
09:30AM-09:50AM
Who Says Network Engineers Have All the Fun?
Room Nottoway (4th)
Speakers Adair Thaxton
Primary track Information Security
Secondary tracks Advanced Networking
10:20AM-11:10AM
Is Weird Really 'Weird'?
Speakers Fatema Bannat Wala
Primary track Advanced Networking
Secondary tracks Information Security
10:40AM-11:10AM
Radically Decentralized IT Audit Response: A How-to Until Next Time
Room Nottoway (4th)
Speakers Bryan Andregg
Primary track Information Security
11:20AM-12:10PM
Splunk Special Interest Group
Room Napoleon Ballroom D2 (3rd)
Speakers Nicholas Lewis
Primary track Information Security
12:30PM-01:30PM
Bees and Spiders, Oh My! : Community Threat Intelligence and Response in Near Real-Time at Large Scale
Room Nottoway (4th)
Speakers Jesse Bowling Keith Lehigh
Primary track Information Security
01:40PM-02:30PM
How to Batfish in Deep Waters (a.k.a. How Does Batfish work at Texas A&M)
Speakers William Deigaard Dan Halperin
Primary track Advanced Networking
Secondary tracks Information Security
01:40PM-02:30PM
Ensuring Consistent Router Security Through Ansible & Git
Room Nottoway (4th)
Speakers Grover Browning
Primary track Information Security
Secondary tracks Advanced Networking
02:40PM-03:30PM
EDUCAUSE, Internet2, and REN-ISAC's Collaboration in Cybersecurity
Room Nottoway (4th)
Speakers Kim Milford Paul Howell Nicholas Lewis Brian Kelly
Primary track Information Security
04:00PM-04:50PM