Navigating Cybersecurity via LabArchives: Defining Roles to Strengthen Data Integrity and Risk Management

Virtual

Join the Zoom Event


“Navigate the intricacies of Software as a Service (SaaS) cybersecurity at UW Madison and discover Plan of Action and Milestones (POA&M) risk remediation strategies to achieve a low-risk score while maintaining compliance. Explore the crucial role of principal investigators (PIs) and other essential stakeholders in data stewardship and discuss the challenges they encounter. Gain insights from the Research Data Governance common solution group discussion and identify ways to support PIs in safeguarding research data, improving risk management, and ensuring compliance.

Attendees will:

  • Learn the fundamentals of the SaaS cybersecurity review process for the LabArchives ELN
  • Understand the importance of defining and documenting roles and responsibilities at various levels and categories of security
  • Hear key takeaways from the common solutions group held two weeks ago (May 15-17)
  • Identify methods to better support PIs in expanding human knowledge while responsibly managing data

Presenter

Static Web Hosting in AWS with OpenID Connect

Virtual

Join the Zoom Event


Learn how to migrate your Apache-based web hosting to a modern, cloud-based solution using Amazon Web Services (AWS)-native services and OpenID Connect. By leveraging CloudFront, Lambda and S3, along with NetID Login service for user authentication, you can create more maintainable, predictable, and reliable deployments. By the end of this session, participants will have the knowledge and concepts necessary to modernize their web hosting approach, resulting in more maintainable, predictable, and reliable deployments in Amazon Web Services.

Attendees will learn:

  • The basics of OpenID Connect and OAuth 2.0
  • How to utilize AWS-native services such as CloudFront, Lambda@Edge, and S3 for static web hosting
  • Strategies for migrating existing sites from Apache + Shibboleth to the AWS-native approach
  • How to incorporate user authentication using NetID Login Service in the new AWS-native environment

Presenter

Enhancing cloud security: From basics to advanced strategies

Virtual

Join the Zoom Event


As more data, applications and business components move from on-premises environments to the cloud, it’s crucial to understand and address the unique security challenges that arise. This session provides a concise overview of cloud security, starting from the basics and progressing to advanced topics. Attendees will gain a foundational understanding of cloud security principles and learn how to implement robust security measures in their cloud environments.

Attendees will:

  • Learn the foundational concepts of cloud security, including common threats and best practices for mitigation
  • Discover how to use automation for secure configuration in the cloud
  • Understand the risk assessment process at UW Madison
  • Recognize the importance of establishing security baselines in a cloud environment and learn how to implement them<

Presenters

DNS and you: A primer on website names

Virtual

Join the Zoom Event


In this session, we’ll dive into the world of Domain Name System (DNS), the crucial component that translates human-friendly website names into machine-readable IP addresses. We’ll explore the fundamentals of DNS, what it is, and how it works, and discuss UW’s policies and practices surrounding DNS. Participants will gain a better grasp of the inner workings of the internet and be equipped with knowledge to troubleshoot and manage DNS-related issues more effectively.

Attendees will:

  • Gain a foundational understanding of what DNS is and how it functions as the Internet’s address book
  • Learn about the hierarchical structure of domain names and how they are resolved into IP addresses
  • Discover the DNS policies and procedures specific to UW–Madison
  • Acquire practical skills to determine where a website is hosted using DNS tools and techniques
  • Develop an appreciation for the importance of DNS in the smooth functioning of the internet and its relevance to their daily online activities

Presenter

Creating workflows in ResearchDrive with Research Object Storage

Virtual

Join the Zoom Event


This session will teach you how to create workflows using campus research data storage solutions, including ResearchDrive and the forthcoming Research Object Storage (S3) service coming this summer.

  • Learn about recent changes to university storage options
  • Discover how to integrate storage solutions into their workflows
  • See examples of using ResearchDrive with tools like Google Drive and campus computer centers for collaboration and data analysis
  • Hear answers to common questions about eligibility, capacity and best practices for using research storage effectively

  • Presenter

    Enhancing your serverless development process

    Room 325/326

    Join the Zoom Event


    Learn how to streamline your Amazon Web Services (AWS) Lambda development process using Visual Studio Code and dev containers. This session will guide you through setting up a local development environment that allows you to automate, debug and develop functions efficiently in Lambda, an event-based serverless computing service for the AWS platform. Discover how these tools can significantly improve your productivity and debugging capabilities.

    Attendees will:

    • See a local Lambda development environment using VSCode and Dev Containers
    • Learn how to automate the Lambda development process
    • Utilize the integrated VSCode debugger for efficient debugging
    • Gain insights into best practices for local Lambda development and debugging
    • Acquire the skills necessary to transition to a local Lambda development workflow

    Presenter

    Building cloud community at UW–Madison

    Room 325/326

    Join the Zoom Event


    Explore the benefits of joining the DoIT Research Cyberinfrastructure community, where researchers, faculty and staff come together to advance their knowledge and application of cloud computing. Expand your knowledge of cloud computing and how it can advance your research and operations.

    Attendees will:

    • Learn about the quarterly meetings organized by the cloud community group to exchange ideas and share user presentations
    • Find out how the AcloudGuru learning platform, provided to community members, can help advance cloud knowledge
    • Discover ways to experiment with cloud services without incurring unexpected charges
    • Participate in an exchange of ideas for leveraging cloud computing in research and operations

    Presenter

    Low code, high empowerment

    Room 313

    Join the Zoom Event


    Low Code Solutions (LCS) is an important service available to campus IT professionals, which creates a user-centric experience while reducing the need for advanced technical knowledge and large time investments that come with traditional software development.

    Attendees will:

    • Discover how the LCS service team can help streamline application development
    • Learn about Betty Blocks, our powerful low-code platform for building low-to-medium complexity applications
    • Explore real-world examples of applications suitable for low-code development, such as request and approval systems or data submission and tracking tools
    • Find out where to access additional information and resources to get started with Low Code Solutions

    Presenters

    Platform X: How SMPH implemented a secure data enclave

    Room 313

    Join the Zoom Event


    Discover how the School of Medicine and Public Health (SMPH) implemented a secure data enclave using DevOps, Azure cloud computing and Microsoft’s suite of security tools. SMPH’s platform enables researchers, data engineers and data scientists to utilize resources like virtual machines, databases, OpenAI, data lakes and Power BI, all while protecting patient privacy. Gain insights into creating and scaling a secure computing environment in the cloud and learn about the platform’s capabilities.

    Attendees will:

    • Learn about the approach SMPH took in creating their secure enclave
    • Hear about the various resources available within the platform
    • Discover how the platform maintains patient privacy while providing access to powerful tools for research and analysis
    • Gain practical tips about how to create and scale your own secure computing enclave in your IT environment

    Presenter