Box to OneDrive update: Transition in full swing
Web CMS project picks up pace for summer
Microsoft Teams now available for group chat, instant messaging, online meetings, and real-time collaboration
Coming soon: Connect your TVs, streaming sticks, printers, and more to the OHIO Wi-Fi
OnBase to require multi-factor authentication starting April 30, 2018
Blackboard Learn May 2018 upgrade details
Reducing Textbook Costs
OBI Reporting to require multi-factor authentication starting Jan 19, 2018
OHIO homepage makes early move to new WebCMS
Blackboard Learn: December 2017 upgrade details

ITSS 2012: YOU are central to IT security

Tuesday, September 4, 2012
Jean Demosky  

2012 IT Security Seminar: You are central to IT security

Join security experts from the Office of Information Technology on Monday, October 15, 2012 as they explore how IT security issues affect you and how you can play a central role in securing OHIO's data assets.

The seminar will focus on both enterprise and personal security, with separate breakout sessions for IT professionals and general technology users.

Printable event poster (PDF)
Register for ITSS 2012
(hosted on Survey Monkey)

Event details

WHO - IT Professionals and General Technology Users
WHAT - 5th annual IT Security Seminar
WHERE - Baker University Center, Ohio University Athens campus
WHEN - Monday, October 15, 2012, 9:00 am - 4:00 pm
WHY - Share the latest trends and information about ensuring your personal and professional technology is safe and secure
HOW - Seminar Presentations, Networking, Keynote, Vendor Expo


Printable agenda (PDF)

8:30 am - 9:00 am
Registration & Coffee
9:00 am - 9:45 am
Introduction: Matthew Dalton, Director of Information Security, Ohio University

Keynote: Kim Milford, Chief Information Policy Officer, Indiana University

10:00 am - 10:45 am
Behaving Securely: You are what you tweet
OIT Information Security Office staff
Controlling what the world thinks about you through email, Internet communications, and social media.


Vendor Presentation: Aruba Networks
AirGroup: How to enable plug-n-play services like Apple Bonjour on an Enterprise WLAN without compromising Security & Performance
11:00 am - 11:45 am
Cloud Computing: Keep your feet on the ground while your head is in the cloud
Matthew Dalton
The risks and benefits of cloud computing


Big Data, Big Brother: "Paranoia will destroy ya..."
Thomas Conley
What information is collected about you and how this data is used.


Vendor Presentation: Codefourtytwo Software
Five ways to protect today's growing university data

12:00 pm - 1:00 pm
Lunch break
1:00 pm - 1:45 pm
Encryption: Be sure to drink your Ovaltine
Ed Carter
Methods, tools, and services for securing information with encryption


BYOD Security: Be Your Own Defense
Mikio Olin
Securing personal and enterprise information when you Bring Your Own Device.


Vendor Presentation: Centracomm
Mobile Security

2:00 pm - 2:45 pm
Risk Assessment: The sky is falling?
Matthew Dalton
Using the FAIR model for risk assessment


Secure Disposal: Trash Talk
Scott Pack
Methods, tools, and services for secure disposal of personal and enterprise information.

3:00 pm - 3:45 pm
Technical Hygiene: Cleaning, grooming, diet, and safety for your computer
Information Security Office staff
Methods, tools, and services for keeping your computing environment in tip top shape.
4:00 pm - 4:45 pm
Open Forum and General Questions
Information Security Office staff
Open discussion and closing remarks

Learn more

For more information, please call 740-566-8246 or email Lacey Hawk,, or Jean Demosky,



Related Links

OIT Security FAQ 
Register for ITSS 2012