CHECK 2024 Sessions
Keynote Presentation: Enhancing Service Management with AI
May 15, 2024
11:55 AM
Even though the popularity of AI is growing every day, and it may feel like we have matured in the field, we are only beginning to scratch the surface of AI's potential, especially in IT Service Management. AI will emerge as a big disruptor and will have a big impact on how we manage IT. As IT management leaders, we either must adapt or risk being left behind.
In this talk, we will discuss the areas where AI has already made inroads into IT Service Management and where we think AI will have a major impact on IT Service Management over the next few years. We will also discuss why incorporating AI into IT at higher learning institutes is important and how IT can help educational institutes better serve the student body.
Track:
Speaker(s):
Keynote
Dr. Piyush Sarwal
Unlocking Student Success: Optimizing EAB Navigate Through Kansas University Collaboration
May 15, 2024
1:00 PM
Join us for an insightful discussion panel on enhancing student retention through collaborative efforts with Kansas universities. Explore strategies to maximize the efficiency of EAB Navigate, leveraging collective expertise to drive impactful retention solutions across our institutions.
Track:
Speaker(s):
IT Administration
Doug Polston
State Privacy Laws and Their Impact on ITS and Data Security
May 15, 2024
1:00 PM
With lack of a US Federal Privacy Law, each State is responsible for determining what type of data is considered sensitive, and how companies must comply with handling of that data. Because there is a vast amount of variance or lack thereof when it comes to state laws for privacy, it can make management of data privacy and security in entities of higher education very difficult to achieve. This presentation will update ITS and Security folks on the "State" of privacy laws and offer some suggestions for how to manage the differences.
Track:
Speaker(s):
IT Administration
Gina Riggs
The AI Horizon at WSU
May 15, 2024
1:00 PM
As the availability and capabilities of Generative AI technologies continue to grow at rapid pace, Wichita State University has developed guidelines and digital resources to provide a clear and consistent message to faculty, staff, and students. This presentation will share lessons learned and important considerations to make when building campus resources for Generative AI. In addition to learning about WSU's campus resources, hear about the direction that WSU will take as Generative AI becomes more integrated with campus technology.
Track:
Speaker(s):
IT Administration
Corby Redington
Tandem Cyber: Hardware Tokens and How to Deploy Them
May 15, 2024
1:00 PM
We will discuss what hardware tokens are, their the benefits and walkthrough a use case.
You will receive a YubiKey 5 NFC token and then we will walk you through how to setup Entra ID authentication with your hardware tokens. This is a live walkthrough, we recommend you have Global admin privileges to enable additional authentication methods or have your Global admins enable the option for you so that you can take advantage.
Track:
Speaker(s):
Sponsor
Tevin Manuel
Panel Discussion: Best Practices for Data Transfer from Navigate to KBOR
May 15, 2024
2:00 PM
The panel will have KBOR a representative who will share their insights, experiences, and strategies for optimizing the transfer process. This discussion promises to be informative and valuable for anyone involved in managing data between Navigate and KBOR systems.
Track:
Speaker(s):
Applications
Doug Polston
Setting Up an AI in Hale Library
May 15, 2024
2:00 PM
I was recently charged with setting up, from scratch, a "ChatGPT like" AI for internal use at Hale Library.This presentation describes my entire process for tackling that problem starting from my first google search and ending with a completed system. I go over pitfalls I found along the way, as well as feedback from our users on what the system is/not good at.
Track:
Speaker(s):
IT Administration
Ian Slater
Responding to Cyber Incidents in Higher Education Tips, Tricks, and Lessons Learned?
May 15, 2024
2:00 PM
Gallagher currently handles KBOR's cyber insurance program. Our cyber insurance consultants Paul Davis and Peter Simonsen will discuss responding to a cyber incident, the role of Gallagher and cyber insurance, and how the cyber threat landscape has changed through the years.
Joined By:
Peter Simonsen, Gallagher
Track:
Speaker(s):
IT Security
Amanda Williams; Peter Simonsen
Optimizing Educational Environments: The Oracle Cloud VMware Solution Pathway to IT Efficiency
May 15, 2024
2:00 PM
We'll cover key topics such as the seamless transition process, how OCVS preserves existing investments in VMware tools and skills, and the specific benefits for educational institutions, such as flexible resource management and advanced security features. Through real-world examples, we will demonstrate how moving to OCI not only reduces the total cost of ownership but also propels IT departments towards a more efficient, agile, and future-ready infrastructure. Join us to learn how your institution can leverage Oracle Cloud technologies to achieve not only immediate financial and operational improvements but also long-term strategic advantages in the competitive higher education landscape.
Vendor Presentation from:
Mike Tenreiro, Sr. Director | Sales and Strategic Accounts, Tharseo IT
Bill Young, CIO, Butler Community College
In the rapidly evolving landscape of higher education, IT departments face the dual challenge of reducing costs while enhancing operational efficiency. This session introduces the Oracle Cloud VMware Solution (OCVS) as a transformative approach for institutions running VMware environments. Attendees will explore the strategic advantages of migrating to the Oracle Cloud Infrastructure (OCI), including significant cost savings, improved scalability, and enhanced performance.
Track:
Speaker(s):
Sponsor
Mike Tenreiro
The Attack on Identity: How Attackers Can Own Your Organization Without Touching the Endpoint
May 15, 2024
2:00 PM
We will discuss how attackers are increasingly making use of "networkless" attack techniques targeting cloud apps and identities. Many IT/Cybersecurity professionals are unprepared to deal with this new threat. The result is a compromised organization– without the attacker needing to touch the endpoint or conventional networked systems and services. We will provide strategies on how to mitigate these types of attacks and prepare your organization for future threats.
Track:
Speaker(s):
Sponsor
Brian Anderson
Making the Makerspace: Lessons Learned at the Sunderland Foundation Innovation Lab
May 15, 2024
3:00 PM
In response to a generous gift by the Sunderland Foundation, K-State Libraries and the Division of Information Technology collaborated to produce the Sunderland Foundation Innovation Lab, an academic makerspace in Kansas State University's Hale Library. Since our presentation at CHECK 2020, the “Innovation Lab” operationalized and opened its doors to K-State and the greater Kansas community. Join us as we reflect over the past few years and revisit lessons learned.
Panel Members:
Cheryl Bachelor-Boothe
Renee Gates
Jahvelle Rhone
Jeffrey Sheldon
Track:
Speaker(s):
User Services
Jeff Sheldon
Data Governance: Protecting Student Privacy
May 15, 2024
3:00 PM
In a world where approximately 328.77 million terabytes of data are created each day, data governance is more important than ever before. How can we, in higher education, be good stewards and protect data privacy, confidentiality and security while democratizing contextual data across the institution? An interactive workshop focused on data governance.
Track:
Speaker(s):
IT Administration
Mandie Lyons
The Cybersecurity Talent Crisis: Your SOC as a Workforce Incubator
May 15, 2024
3:00 PM
Sponsor Presentation From:
TekStream/Splunk
The talent gap in cybersecurity is at a crisis point. With an 8 to 1 ratio of jobs for every newly qualified analyst, institutions struggle to attract, train and retain their security team. Using your SOC as an incubator for new talent is possible with the right partner, and TekStream has a proven SOC program powered by Splunk with applications in education as well as state, local and federal government agencies.
Track:
Speaker(s):
Sponsor
Bruce Johnson
AI Impact on the Modern Threat Landscape
May 15, 2024
3:00 PM
Learn about the complexities of the modern landscape and 3 Cyber strategies you need. New strategies that will significantly reduce your risk, reduce operational complexity, and what NexGen Strategy looks like.
Track:
Speaker(s):
Sponsor
Kevin Schmehl; George Cater
Financial Aid: Transitioning from Homegrown to the Cloud
May 15, 2024
4:00 PM
We invite you to join us for an exciting journey as we share our experience transitioning from our in-house developed financial aid system to Oracle’s cloud-based Student Financial Planning (SFP) product. In this session, we'll demonstrate how seamlessly we incorporated a scholarship application into Oracle’s configuration files and the Non-Federal Fund Roster Load process.
Track:
Speaker(s):
IT Administration
Jeff Burns
Storage Wars: Decoding the Microsoft 365 Cloud
May 15, 2024
4:00 PM
Attend this session to delve into the intricacies of Microsoft's end-user cloud storage infrastructure, from OneDrive to SharePoint to Teams. We will explore how data flows across these various platforms and services, providing insight into the integration that underpins the storage ecosystem of Microsoft 365. Additionally, we will address common frustrations and issues faced by end-users, offering practical strategies for resolution. The solutions to common problems might be simpler than you think—no admin privileges required for these troubleshooting tricks! You will come away with a deeper understanding of Microsoft 365 cloud storage and enhanced troubleshooting skills to immediately put to use.
Track:
Speaker(s):
IT Administration
Ali Levine
MFA Implementation
May 16, 2024
9:00 AM
Lessons learned while implementing MFA for Students.
Joined By:
Brandon Whiteside, Server Analyst, WSU
Milissa Hawkins, Manager of the Technology HelpDesk, WSU
Jake Coffman, Deputy Chief Information Officer, KU
Homer Manila, Director Information Security, Washburn
Track:
Speaker(s):
IT Security
Santiago Vera Torres; Milissa Hawkins; Homer Manila; Brandon Whiteside
Impact of Data Governance on Application Development at WSU
May 16, 2024
9:00 AM
WSU implemented a data governance process over two years ago. While it may appear to be just more bureaucracy it has helped to remove ITS from being the “No” organization for data requests and has helped curtail surprise system purchases.
Track:
Speaker(s):
IT Administration
Brett Morrill
Rocking the Internship Journey: Inclusive Onboarding, Operations, and Offboarding
May 16, 2024
9:00 AM
We’ll dive in, learning and sharing best practices to help interns and student staff truly belong in higher education website teams. Building on initial engagement, we’ll also discuss creating an environment where everyone has a voice that matters. Learn ways to track progress and give feedback that helps interns and students grow. Learn how to build relationships that last, to enhance your institution’s IT recruiting pipeline. And, I’ll share my experiences with onsite, hybrid, and fully remote internship programs.
Track:
Speaker(s):
IT Administration
Johnathan Grant
Sponsor Presentation from Lenovo Platinum: Security for the Modern Workforce
May 16, 2024
9:00 AM
This presentation will provide an overview of Lenovo Security Offerings that deliver end-to-end protection from the build to the field.
Lenovo provides the best in class security for your complete IT landscape. Learn what tools offered fit your particular need or learn all of them to complete you security journey and plug all gaps in your environment from the build of the system to the field
Track:
Speaker(s):
Sponsor
A New Strategy Behind Strategic Planning
May 16, 2024
9:00 AM
If you've ever been involved in strategic planning for your department or you institution, you know the level of detail and complexity that can come out of that process. Join Pittsburg State University’s Executive Director of University Affairs and their CIO to learn about a new approach that PSU took for their latest strategic plan. This creative and ‘all in’ approach has led to a strategic plan that is highly transparent with multiple levels of accountability. To make the management of such a plan doable the university is using a new product developed by the University of Nebraska that will be demonstrated for you at this session. Join us to learn about the this new approach, lessons learned, and come prepared share ideas and approaches from your own institution.
Primary Presenter:
Jaimie Dalton, Executive Director of University Affairs
Track:
Speaker(s):
IT Administration
Jaime Dalton
Discussion of Cyber Threats
May 16, 2024
10:00 AM
Discussion of different approaches to and issues regarding Cybersecurity amongst the universities. How to protect our servers and resources, implement cyber security controls, and lessons learned. What are some common threats.
Panel Members:
Mark Rodee
Dan Larrea
Milissa Hawkins
Jake Coffman
Homer Manila
Track:
Speaker(s):
IT Security
Jessica Wolf; Milissa Hawkins; Mark Rodee; Dan Larrea; Homer Manila
Partnering To Deliver A Never Seen Before SIS
May 16, 2024
10:00 AM
Pittsburg State University is in the process of implementing the last of 4 ERP modules. And we saved the best for last the Student Information System! Join us to hear about our journey so far with our amazing partners that have helped to make the selection, planning, and implementation of this pivotal system a reality for PSU.
Joined By:
Luecrita Haraughty, Director of IT Project and Process Management
Track:
Speaker(s):
Applications
Angela Neria; Luecrita Haraughty
Cranky Mac Admins
May 16, 2024
10:00 AM
Let's face it, Mac Administration can be challenging at times! In this roundtable discussion we can talk about everything from the good and the bad to what is working and what is not.
Joined By:
Louis Antoine, KU
Track:
Speaker(s):
IT Administration
Jeremy McLeod; Louis Antoine; Todd Kitchen
Sponsor Presentation: How Higher Education is Using Generative AI
May 16, 2024
10:00 AM
Travis Berkley, Sr. Solutions Architect, Amazon Web Services
Track:
Speaker(s):
Sponsor
Travis Berkley
Building a Successful Career: Advice from Mid-Level Managers
May 16, 2024
11:00 AM
Building a Successful Career: Advice from Mid-Level Managers
Are you a new or aspiring manager in higher education looking to learn from experienced mid-level managers? Then join us for an insightful panel discussion featuring mid-level managers from diverse areas of higher education, who will share their experiences and insights on navigating the path to management.
During this panel discussion, you will have the opportunity to learn from seasoned managers who have successfully made the transition from individual contributors to managers in higher education. Our panelists will discuss the unique challenges they faced in the higher education environment, the skills and competencies required for success, and the strategies they used to overcome obstacles and achieve their goals.
This discussion will be particularly relevant for new or aspiring higher education managers seeking to develop their leadership skills, build effective teams, and navigate the complex dynamics of academia. Our panelists will also provide practical tips and advice for managing up, down, and across the organization and strategies for building a supportive network of colleagues and mentors in higher education.
Panel Members:
Matthew D. Carver - Director of IT, K-State Aerospace & Technology Campus
Suzie Johannes - Associate Director, KU Information Technology
Luecrita Haraughty - Director of Project and Process Management, Pittsburg State University
Michael Nease - Michael "Mike" Nease, Dir. of Campus A/V, Theater, and Special Event Svcs, Fort Hays State University
Track:
Speaker(s):
IT Administration
Matthew Carver; Michael Nease; Luecrita Haraughty; Suzie Johannes
Managing and Sharing threat intelligence with MISP
May 16, 2024
11:00 AM
Sharing threat intelligence with the Malware Information Sharing Platform (MISP)
Everyone in the Kansas education technology space is using and generating an incredibly valuable comodity which is threat intellegence. If your organization owns a next generation security appliance then chances are that it is consuming a feed of threat intellegence that is created by a threat intellegence organization. The point of this talk is how to make use of MISP to share our information security efforts with other education institutions for mutual benefit. I also will go over some very basic threat intellegence processes and tools which will help make your efforts more efficient. I also want to show the the value of using third party threat intellegence sources such as OSINT, ISAC's and vendor feeds.
•1.0 Define what is threat intelligence and describe how a TI program works.
•1.1 Discuss the value of evaluating TI sources & review some analysis techniques to accomplish TI evaluation.
•2.0 Showcase the MISP application.
•2.1 Demonstrate some use cases on where MISP can fit into a TI program.
•2.2 Review common TI sources.
•2.3 Identify tools and resources that can be used with MISP.
•2.4 Illustrate the importance of using tags and galaxies with MISP events.
•2.5 Discuss ways to Ingest information into and to export information from MISP.
•2.6 Demonstrate how to create an event in MISP.
•2.7 Show examples of events in MISP.
•2.8 Review how to federate MISP instances with each other and discuss Lessons learned when standing up a MISP server.
•3.0 Works Cited and Informative resources
Track:
Speaker(s):
IT Security
Joel Kershner
Blazing a Trail
May 16, 2024
11:00 AM
Pittstate has adopted Blazor as our frontend framework of choice. The weeks of frustration and confusion have paid off and we're pleased with the route we've taken. Time to tell others about it. We'll be talking about where we were, what we needed, and how we got to where we are now.
Joined By:
Eric Soucy, Information Specialist, Pittsburgh State University
Track:
Speaker(s):
IT Administration
Tommy Hoyt; Eric Soucy
Creating a Technology/Cyber Resiliency Plan and Incident Response Framework
May 16, 2024
11:00 AM
This presentation provides high level information on how to create a resiliency plan that supports the operations of your entity. Additionally, how to create an incident response framework that will provide your entity a coordinated response. This is not a down in the weed's how to do IT response and recovery but a high level (50,000-foot view) of what a response could look like to keep everyone on the same page and provide appropriate support and guidance during an incident. This presentation takes into account lessons learned across the state with different incidents.
Track:
Speaker(s):
IT Security
Erin McGinnis
Sponsor Presentation from Logicalis: Hold My Beer...Navigating the Rising Costs of Virtual Licensing
May 16, 2024
11:00 AM
Track:
Speaker(s):
Sponsor
Ben Hudson
Sponsor Presentation from HPE Aruba Networking: The Future, ZTNA, and You
May 16, 2024
11:00 AM
Track:
Speaker(s):
Sponsor
Josh Mack
CIT/CTO Panel
May 16, 2024
12:10 PM
Panel Discussion Questions
1.What are your top recommendations for protecting against cyber security incidents?
2.How do you presently or plan to use AI in your information technology resources on campus?
3.How are you protecting and enhancing remote work IT needs on your campus?
4.How can we better attract and retain our campus IT workforce?
5.What is your top critical need for IT on your campus?
Track:
Speaker(s):
Panel