Parallel Sessions Abstracts 41-45 Wednesday, 10:45-11:45

pdf version

Session 41: Building and Integrating Federated Applications

Location: MDCL 1105

The Access Federation has seen a number of applications connected that run the gamut from basic access to sophisticated uses and would like to share how they are connecting and the lessons learned. We will cover topics ranging from best practices to emerging design patterns and have sample use cases.

Deploying eduRoam on your Campus

The Access Federation eduRoam service is ever expanding and has collected some lessons learned and implementation recipes from the field to share. The basics of eduRoam will be covered as well, details of structure and design of various deployments in play across Canada, and a look at future developments. Q and A will be taken time permitting

Session 42: Maturing IT governance practices through effective PPM change management

Location: MDCL 1307

Project Portfolio Management (PPM) initiatives are one method of helping IT departments evolve from their traditional order taking role to a more positive partnership with the rest of the organization. While most executives and project stakeholders can conceptually understand the benefits of consistent work intake, prioritization, and management practices, many such initiatives fail to achieve the expected behavioral changes and business benefits due to poor change management practices.
This presentation will highlight the symptoms and root causes of PPM initiative failures and will provide some field-tested approaches to help secure executive commitment as well as buy-in from functional managers and project teams. The second half of the presentation will be a case study on Carleton University’s IT Project Management Office which applied a number of these practices in the implementation of their governance model.

Session 43: A Comprehensive Client-Centered Approach to Prioritizing and Managing Development Projects

Location: MDCL 1305

In this presentation, which is targeted at IT and Functional managers, Garry explains UVic’s comprehensive client-centered approach to prioritizing and managing development projects, and provides an overview of the associated governance structures.

Session 44: CUCCIO SIG overview: Instructional Technologies, Portal Technologies & Common CV

Location: MDCL 1110

The active SIG’s are Instructional Technologies (Andrea), Security (George Farah), Portal Technologies (Peter Rowley) and Common CV (Purita Bristow/Sean Moriarty).

Panel members:

Session 45: Malware Incident Strategies

Location: MDCL 1309

In the last several years emerging threats making use of 0-day exploits are outpacing the development of AV and detection tools. Botnet agents delivered via email and drive-by downloads can now go undetected within an organization for months if not years, and cause previously unimaginable damage. Response strategies that emphasize restoration of individual service over understanding the larger threat no longer suffice.
In response to this evolution, Memorial University has moved from simply eradicating to assessing each new malware incident that comes to its attention. Incident triage, centralized AV logging, collection and analysis of unknown malware samples, and working closely with our AV vendor have proven fundamental to this approach; other efforts less so. Ample time will be allotted for group discussion. We are eager to hear what has and hasn’t worked for you in your malware battles as well!

Trend Micro deployment

Like other industries, the IT department at the University of Windsor processes a large amount of information on a daily basis. We need to make sure the info is available when needed, without risking the security of that data. Compromising sensitive data not only results in privacy issues, it could also result in serious consequences.
As technology continues to advance, so does the threat of malware. Malware is becoming more sophisticated in regards to how they are written, how they are transmitted and how they deliver their payload. New defense tools and strategies need to be implemented to protect against malware infections.
By implementing Trend Micro products, we are able to reduce risk while protecting valuable information against malware infections and data loss