Digital Transformation: The ASU University Technology Office Story

  Presented by Chris Richardson • Deputy CIO of Development, Mobility, and Smart Cities • ASU

COVID-19 has accelerated digital transformation to a point we thought we’d reach in 2025. But the groundwork for such a leap was laid some time before at the ASU University Technology Office. Deputy CIO IT Development, Mobility and Smart Cities, Chris Richardson, will share how the culture of innovation at UTO, and its agile mindset, represent an exciting new definition of digital transformation.

Chris Richardson is the Deputy Chief Information Officer Development, Mobility, and Smart Cities at Arizona State University, organized as part of ASU’s University Technology Office. Mr. Richardson and his team are responsible for aligning with key stakeholders to lead the strategy, upgrade cycle, new functionality enhancements, and maintenance of a number of Enterprise applications across the diverse landscape of ASU; key applications to note include myASU, eAdvisor, uAchieve, Salesforce, and Peoplesoft. In addition to development and business analysis with these and other applications, Mr. Richardson’s team is advancing the landscape and vision of mobile applications and standards, web standards, and a User Experience Center of Excellence.

Chris Richardson recently joined ASU from Honeywell where he held several positions over an 11- year career. His most recent role was Senior Director of IT Service Delivery for the Performance Materials and Technologies business group, global accountability of all application and infrastructure operations for a $12B organization. As Director Service Operations Support of the centralized infrastructure organization, his team supported more than 120,000 employees globally for their Service Desk and desktop support experiences, the identity and access management for their systems, the monitoring of critical infrastructure, and all ITIL process ownership for incident, problem, knowledge, access and event management. He has also held responsibility as Director for Desktop Services, Senior Program Manager, IT Audit Manager, European Manager Co-Sourcing, and Senior Business Analyst in the Transportation Systems business group.

Mr. Richardson has also been responsible for product and web development at his own companies, Tru Realty and ASPACT Schools (no longer in existence), as well as at Talisma Corporation and License Online.

Chris holds a double Bachelor of Science in Zoology and Fisheries from the University of Washington, a Master of Arts in Teaching from the University of Puget Sound, and a Master of Business Administration (MIS, Finance, and Entrepreneurship emphases) from the University of Arizona. During Chris’ working career he has obtained PMP, CIPP, and ITIL Expert Lifecycle certifications; he was also a part of Honeywell’s Pathways, IT Leadership Development, and HITS Leadership IT Functional training programs.

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

IoT: Additional Challenges It Poses in a Pandemic-Induced Work Environment

  Presented by Lester Godsey • CISO, Maricopa County

According to SecurityToday.com we will see an estimated 31 billion IoT devices added to the Internet in 2020 and a whopping 75 billion in 2025. While many of these devices are corporate/industrial (IIoT) in nature, there is a very large home/personal IoT market to contend with.

Now that a significant portion business is being done at home and other locations other than the office, what impact are these devices having from a cybersecurity perspective as it relates to:

  • Security vulnerabilities
  • Security controls and awareness, we typically have in corporate networks but lack in home offices
  • What data is leaving corporate systems – inadvertently and purposely
  • Ability to adhere to governmental and industry compliance standards
  • Join us for an in-depth conversation around the ‘normal’ challenges with IoT devices and solutions and how this new paradigm of working from home exacerbates them.

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Structured & Aruba

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

First Quarter of Containment

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.

Talking to the Board About the New Realities of IT Security

  Presented by ExtraHop Networks

With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities of business — including large-scale adoption of work-from-home technologies, heightened activity on customer-facing networks, and greater use of online services.

While these examples of agility allowed business to continue, they also greatly increased the risk of misconfigurations and cyberthreats. Now, it’s looking like they could be here to say for a while. On top of that, bad actors have wasted no time trying to exploit new vulnerabilities. In the past several weeks, we’ve seen ransomware attacks affect several major organizations. These attacks come on the tail of a surge of attacks across the board brought on during the pandemic, as hackers scanned and took advantage of new workloads, and vulnerable VPN connections and misconfigurations left the gates to the network open.

When attacks like these make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? We will share top strategies for CISOs to lead board-level conversations about risk management amidst the stark new realities of IT.

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Gaining Network Visibility with Application Intelligence

  Presented by Gigamon

Come discuss how gaining visibility into your network has become more of a challenge than ever before. With the evolution from the Data Center to Virtual Environments, Public and Private Clouds, our exposure has never been greater.

In this session we will cover Span vs. TAP, Traffic Aggregation, Packet Brokers, Traffic Intelligence, Virtual Environments and how to get that one view of all your data.

Learn how to maximize the ROI on your existing tools while increasing your scope of visibility.

Who knows, you might even have fun?! Heckling Encouraged!