Loading…
2016 TRETC has ended
Welcome to the TRETC 2016 mobile app! 

**Note: Logging in or creating a profile on Sched DOES NOT register you for TRETC; you MUST register HERE in order to be considered a participant in the conference.**

You can use your email to sign in, add a photo and bio, customize your schedule and stay connected throughout the conference. Connect with your social networks to automatically fill in your information and connect with your contacts. You can make profile edits from the desktop site, available in the main menu, and in the top left of the mobile site. #TRETC2016
Infrastructure [clear filter]
Tuesday, November 8
 

9:10am EST

Facilitating Innovation
Limited Capacity seats available

Presentation uploaded in Powerpoint format at 11/8 - 10:41am

Google Sheets link here:  https://docs.google.com/presentation/d/1ThlC5TTx9_-tDCDflvTAecNqxYRH6GfUulLPRX9nECI/edit#slide=id.g17b45fd7fd_0_7

Optional pre-session survey available here - https://goo.gl/forms/xxQfgbvQEnMJcSkC3

Innovation in schools can be challenging to entertain, support and sustain. So often we are behind the 8 ball just trying to keep up with the essentials that there is no time to experiment or no extra capacity with which to experiment. While we know that teaching experienced teachers new tricks can often be challenging it can be done. It is nary possible to teach old infrastructures new tricks. How do schools prioritize the importance of up to date infrastructure when new networking equipment, servers and SANS hardly compete with the sex appeal of one to one computing?

Speakers
avatar for Ron Reyer

Ron Reyer

Director of Technology Services, Bethel Park School District
Technology innovation in education.



Tuesday November 8, 2016 9:10am - 10:10am EST
Room 308

10:15am EST

How 'Cyber' secure is your K-12 & STEM Environment? What to look for and what not to do.
Limited Capacity seats available

The growth of new education technologies in our classrooms is placing a huge importance on the infrastructure of a school. These infrastructures need to work without fail so that the one-to-one programs, online assessment tools and the STEM/Teaching IoT devices bring student success. With cyber breaches on the rise, this session looks at the trends in K-12 and how to secure your cyber infrastructure to adapt to these demands. Through a panel discussion, we ask “is it really secure enough for the latest teaching with IoT and STEM devices?”

Co-Speaker
avatar for Ed McKaveney

Ed McKaveney

Technology Director, Hampton
Having worked with educational technologies, media and security in higher education and K-12 for 25-years, Dr. McKaveney has been continuously focused on the advancement of student learning, faculty development and operational success through innovative use of technologies. In addition... Read More →

Speakers

Tuesday November 8, 2016 10:15am - 11:15am EST
Room 305

1:00pm EST

Establishing a right-sized Information Security Program for K12
Limited Capacity seats available

As threats to technology systems and data are on an exponential rise, the development of an information security program becomes critically important to combat and address technology risk.   An effective Information Security and risk management goes well beyond the implementation of just security enforcement technologies and products.  It is the intersection of People, Process and Technology that creates a risk management lifecycle capable of being repeatable and sustainable within an organization.   Using a continuous risk management approach it helps an organization address the ever-changing threat and vulnerability landscape to systems and data.

Program Objectives:

 

Attendees will learn about developing an Information Security Program using a continuous risk management lifecycle approach.   We will identify the components of a security program, review the continuous risk management methods and demonstrate how these concepts can be designed to fit into any organization regardless of size or industry.  We will review a sample of leading information security frameworks, standards and control structures that can be used as a foundation to building an effective continuous risk management program.  Discussions on how and where to get started on building a continuous risk management program will be presented with recommendations on how to get started in your organization. 


Speakers
JA

John A. Otte

Principal Security Strategist Lead Auditor, ePlus Technology Inc
John A. Otte, C|CISO, CISSP, CISA, CISM, MBA, MSIA, ISO 27001 Lead AuditorePlus Technology, inc - Principal Security StrategistJohn is the Principal Security Strategist for ePlus. John is an accomplished Information Security and data protection professional with over 15 years of Systems... Read More →



Tuesday November 8, 2016 1:00pm - 2:00pm EST
Room 318

1:00pm EST

Introduction to IPv6
Limited Capacity seats available

This presentation will provide an introduction to IPv6 including how it works, similarities to IPv4, implementation strategies, and the reasons for moving to a dual stacked network. Hempfield School District has fully implemented IPv6 as part of our infrastructure upgrades supporting a 1:1 iPad initiative.

Speakers
avatar for Michael Graham

Michael Graham

Chief Information Officer, Hempfield School District
Mike Graham has been the Director of Technology for the Hempfield School District for the last eight years, previously working as the district's Assistant Director and Systems Administrator. He holds degrees in Educational Technology Management and Information Systems from Carnegie... Read More →


Tuesday November 8, 2016 1:00pm - 2:00pm EST
Room 306
 
Filter sessions
Apply filters to sessions.