“Navigate the intricacies of Software as a Service (SaaS) cybersecurity at UW Madison and discover Plan of Action and Milestones (POA&M) risk remediation strategies to achieve a low-risk score while maintaining compliance. Explore the crucial role of principal investigators (PIs) and other essential stakeholders in data stewardship and discuss the challenges they encounter. Gain insights from the Research Data Governance common solution group discussion and identify ways to support PIs in safeguarding research data, improving risk management, and ensuring compliance.
Attendees will:
Learn the fundamentals of the SaaS cybersecurity review process for the LabArchives ELN
Understand the importance of defining and documenting roles and responsibilities at various levels and categories of security
Hear key takeaways from the common solutions group held two weeks ago (May 15-17)
Identify methods to better support PIs in expanding human knowledge while responsibly managing data
Learn how to migrate your Apache-based web hosting to a modern, cloud-based solution using Amazon Web Services (AWS)-native services and OpenID Connect. By leveraging CloudFront, Lambda and S3, along with NetID Login service for user authentication, you can create more maintainable, predictable, and reliable deployments. By the end of this session, participants will have the knowledge and concepts necessary to modernize their web hosting approach, resulting in more maintainable, predictable, and reliable deployments in Amazon Web Services.
Attendees will learn:
The basics of OpenID Connect and OAuth 2.0
How to utilize AWS-native services such as CloudFront, Lambda@Edge, and S3 for static web hosting
Strategies for migrating existing sites from Apache + Shibboleth to the AWS-native approach
How to incorporate user authentication using NetID Login Service in the new AWS-native environment
As more data, applications and business components move from on-premises environments to the cloud, it’s crucial to understand and address the unique security challenges that arise. This session provides a concise overview of cloud security, starting from the basics and progressing to advanced topics. Attendees will gain a foundational understanding of cloud security principles and learn how to implement robust security measures in their cloud environments.
Attendees will:
Learn the foundational concepts of cloud security, including common threats and best practices for mitigation
Discover how to use automation for secure configuration in the cloud
Understand the risk assessment process at UW Madison
Recognize the importance of establishing security baselines in a cloud environment and learn how to implement them<
In this session, we’ll dive into the world of Domain Name System (DNS), the crucial component that translates human-friendly website names into machine-readable IP addresses. We’ll explore the fundamentals of DNS, what it is, and how it works, and discuss UW’s policies and practices surrounding DNS. Participants will gain a better grasp of the inner workings of the internet and be equipped with knowledge to troubleshoot and manage DNS-related issues more effectively.
Attendees will:
Gain a foundational understanding of what DNS is and how it functions as the Internet’s address book
Learn about the hierarchical structure of domain names and how they are resolved into IP addresses
Discover the DNS policies and procedures specific to UW–Madison
Acquire practical skills to determine where a website is hosted using DNS tools and techniques
Develop an appreciation for the importance of DNS in the smooth functioning of the internet and its relevance to their daily online activities
This session will teach you how to create workflows using campus research data storage solutions, including ResearchDrive and the forthcoming Research Object Storage (S3) service coming this summer.
Learn about recent changes to university storage options
Discover how to integrate storage solutions into their workflows
See examples of using ResearchDrive with tools like Google Drive and campus computer centers for collaboration and data analysis
Hear answers to common questions about eligibility, capacity and best practices for using research storage effectively
Learn how to streamline your Amazon Web Services (AWS) Lambda development process using Visual Studio Code and dev containers. This session will guide you through setting up a local development environment that allows you to automate, debug and develop functions efficiently in Lambda, an event-based serverless computing service for the AWS platform. Discover how these tools can significantly improve your productivity and debugging capabilities.
Attendees will:
See a local Lambda development environment using VSCode and Dev Containers
Learn how to automate the Lambda development process
Utilize the integrated VSCode debugger for efficient debugging
Gain insights into best practices for local Lambda development and debugging
Acquire the skills necessary to transition to a local Lambda development workflow
Explore the benefits of joining the DoIT Research Cyberinfrastructure community, where researchers, faculty and staff come together to advance their knowledge and application of cloud computing. Expand your knowledge of cloud computing and how it can advance your research and operations.
Attendees will:
Learn about the quarterly meetings organized by the cloud community group to exchange ideas and share user presentations
Find out how the AcloudGuru learning platform, provided to community members, can help advance cloud knowledge
Discover ways to experiment with cloud services without incurring unexpected charges
Participate in an exchange of ideas for leveraging cloud computing in research and operations
Low Code Solutions (LCS) is an important service available to campus IT professionals, which creates a user-centric experience while reducing the need for advanced technical knowledge and large time investments that come with traditional software development.
Attendees will:
Discover how the LCS service team can help streamline application development
Learn about Betty Blocks, our powerful low-code platform for building low-to-medium complexity applications
Explore real-world examples of applications suitable for low-code development, such as request and approval systems or data submission and tracking tools
Find out where to access additional information and resources to get started with Low Code Solutions
Discover how the School of Medicine and Public Health (SMPH) implemented a secure data enclave using DevOps, Azure cloud computing and Microsoft’s suite of security tools. SMPH’s platform enables researchers, data engineers and data scientists to utilize resources like virtual machines, databases, OpenAI, data lakes and Power BI, all while protecting patient privacy. Gain insights into creating and scaling a secure computing environment in the cloud and learn about the platform’s capabilities.
Attendees will:
Learn about the approach SMPH took in creating their secure enclave
Hear about the various resources available within the platform
Discover how the platform maintains patient privacy while providing access to powerful tools for research and analysis
Gain practical tips about how to create and scale your own secure computing enclave in your IT environment
Welcome 9:00-9:15am – IT Professionals Conference co-chairs Sarah Lien and Elizabeth Kraege-Soechting will provide introductory remarks for the conference.
Keynote 9:15-10:15am – Dr. Joe Sanfelippo, the nationally recognized superintendent of Wisconsin’s Fall Creek School District, will deliver the keynote address at this year’s IT Professionals Conference.
Keynote Description:
I’m just…It’s a phrase we hear all the time. I’m just a sysadmin, I’m just a security analyst, I’m just a instructional designer….the list is long and is often followed by reasons why something CAN’T happen. Leadership is an action and it starts with you. Leading with INTENTION creates purpose. Leading with CONNECTION creates momentum. Leading with DIRECTION creates collective efficacy. Leading with all three in mind will build your capacity and foster an environment where everyone in your organization has the best opportunity to lead from where they are.