Information Security Symposium
On June 20-21, 2017, technical professionals and administrative managers from ten University of California campuses and medical centers/health systems will convene at UC Davis for the eighth Information Security Symposium. Registration is open until May 22, 2017. This biennial event provides IT professionals from all UC campuses and other higher education guests, the opportunity to meet and discuss computer, network and information security issues and strategies, and provides an ideal forum for the exchange of privacy and security enhancement ideas and solutions. As quickly as technology has advanced, so have cyber security threats. Security and the use of technology to confront today’s threats is a high priority across the University of California system.
The main conference site will be the UC Davis Conference Center and Mondavi Center . The event takes place Tuesday and Wednesday, June 20-21, 2017. Instructional computing labs and lectures are scheduled for both days. Financial sponsors may host a lecture and all sponsors (financial and instructional) will have an opportunity to informally meet conference attendees to showcase their technology offerings. Continental breakfasts, as well as lunch and snacks will be provided on both days. Hotel reservations can be made at the Aggie Inn
, Best Western
, Hallmark Inn
, or Hyatt Place
. Mention the group name “Information Security Symposium”.
Due to popular demand we are expanding capacity for the 2017 event. Information privacy professionals, system and security administrators and unit managers from UC Davis and the other nine University of California campuses, as well as Medical Centers and Health Systems will be in attendance. The chief information security officers of California community colleges and campuses of the California State University system have also been invited. The attendees represent the technical leads for many units across the entire university systems and are typically responsible for making technology and training decisions. Many are leading edge technology adopters. Administrative unit managers are typically responsible for budgetary approval.
Sessions and Tracks
Secure the Five – Secure the Future
with sessions focusing on the top five security functions – Identify, Detect, Protect, Respond, and Recover. Tracks include Security Leadership and Management, Secure the Config, From the Cutting Edge, Can’t Secure the Unknown, Secure the Cloud, and After the Breach. Also included at the symposium will be the semiannual UC Cybersecurity Summit with the dedicated track The Race to Resilience. Sessions will include technical and non-technical presentations, as well as hands-on labs. The duration of instructional labs will be two hours and the duration of lectures will be one or two hours. Sessions include general topics as well as specific technologies or solutions.