2025 Conference Schedule

We are excited to welcome you to ODU for two days of presentations, keynotes, panels, activities and more! Browse the conference schedule to see the array of presentations planned from institutions across the Commonwealth.

Monday, October 13

7:15 – 8:15 a.m.
Registration & Breakfast
Center Cafe & North Cafe (1401 & 1402)
8:00 – 8:15 a.m.
Welcome
Center Cafe & North Cafe (1401 & 1402)
8:15 – 9:15 a.m.
Keynote
Center Cafe & North Cafe (1401 & 1402)
9:15 – 9:30 a.m.
Expo Break & Session Change
9:30 – 10:30 a.m.
Agentic Future: Are we Ready for AI Transformation?
Presenter: Dan Han, VCU CISO
Location: Center Cafe & North Cafe (1401 & 1402)
LLMs and Generative AI have continued its rapid development over the past 12 months. The new buzz term of this year is AI agents. In this talk, we will take a look at the development of generative AI technologies in the past year, such as the adoption of MCP, llmstxt, multi-model context switching, vibe coding, among others, while taking a look at some of the threat and vulnerabilities, as well as what we can do as security practitioners to enabled organizations to safely adapt to the rapidly evolving technology.

Virginia Response; How the State Responds to Public Service Incidents – Fusion Center
Presenters: Scott Brinkley, VITA Incident Response Manager & Olivia Cassadaward, Virginia Fusion Center Cyber Program
Location: James River & Lynnhaven River Rooms (1303 & 1304)
Presentation and Explanation of Virginia Response to Public Service Incidents

Zombie Accounts in your Directory: How to Battle these Fake/Ghost Accounts
Presenter: Jer Kong, InfoSec Analyst, UVA
Location: York & Potomac River Rooms (1305 & 1306)
This topic isn’t new, but it was to me this year at UVa. The attackers had lower hanging fruit at the community college systems where the bar to entry is much lower. However, the attackers are exploiting lower thresholds to get an account established in your OU/directory, and once they get a foothold, what exactly are they doing with it? How do these accounts get through the admissions vetting process? How much access do you give to an applicant? I have crafted a few parameters that may be helpful in detection of these fake accounts and you may be able to use these IOC’s to look and find if your directory may have similar accounts that are not legitimate.

The New Era of Threat Protection: Utilizing the Power of AI and Automation to Mitigate Risk
Presenter: Nate Parks, Dynatrace
Location: Student Center Chambers (1302)
While cybersecurity threats have continued to steadily grow in both number and intensity over the past several years, your applications are also growing in complexity. By leveraging industry best practices around AI-driven solutions for automating previously manual tasks, you can help your institutions improve your security posture and response to better detect, block, remediate, and even prevent threats in real time. This is especially critical to help safeguard your student data and ensure trust, compliance, and academic continuity.
10:30 – 10:40 a.m.
Expo Break/Meet The Sponsors
10:40 – 11:40 a.m.
Building a Student SOC: Bridging Academia and Operations for Real World Impact
Presenters: ODU – Luke Watson, Deputy CISO; Kate Rhodes, CIO; Dr. Daniel Takabi, Director School of Cybersecurity
Location: Center Cafe & North Cafe (1401 & 1402)
Old Dominion University is launching a student Security Operations Center (SOC) through a unique partnership between the University Information Security Office and the School of Cybersecurity. This collaborative effort is designed to provide students with hands-on experience in real-world security operations while meaningfully contributing to the university’s overall security posture. Reaching this point required extensive planning, stakeholder alignment, strong support from upper management, and a shared commitment to integrating academic and operational goals. In this session, we’ll walk through the planning process, how we structured the program, defined student roles and responsibilities, aligned academic learning outcomes with operational needs, and established a framework for training, mentorship, and sustainability. Attendees will leave with a practical blueprint for building similar partnerships and programs at their own institutions.

VPN Decommissioning: The Dream, The Drama, The Delay
Presenter: Jesse Catellani, Security Architect, VCU
Location: James River & Lynnhaven River Rooms (1303 & 1304)
Have you tried to decommission a legacy VPN? Did you run in technical, organizational, and cultural challenges? VCU has used Zscaler for over 2 years as a replacement for our aging Cisco AnyConnect VPN solution. As we attempt to put hatchet into the back of our VPN appliance, we have some lessons learned that we’d like to share.

PatchKnife: A Precision Toolkit for Hunting Exploitable Vulnerabilities in the Shadows – Built for Teams Without a Budget for Big Scanners
Presenters: Caeland Garner, Lead Penetration Tester & Security Researcher
Location: York & Potomac River Rooms (1305 & 1306)
PatchKnife is a modular security reconnaissance and exploitation toolkit built for higher education environments—from large-scale university networks to smaller colleges and under-resourced IT teams. Unlike traditional scanners that overwhelm with noise or require costly licenses, PatchKnife delivers exploit-confirmed findings in real-time, empowering security teams to identify actual threats—not just theoretical ones. In this session, learn what makes PatchKnife unique and how it was built for the EDU community. Whether you’re protecting a distributed campus, safeguarding research data, or securing distance learning systems, PatchKnife delivers enterprise-level precision without the enterprise-level price tag.

Mastering Incident Response: Strategies for Security Operations in Higher Ed
Presenter: Drew Malone, Solutions Engineer, WIZ; Craig Kilgo, Enterprise Architect, VCU Info Sec
Location: Student Center Chambers (1302)
As higher education increasingly relies on cloud services to power mission-critical applications, IT and security teams face mounting challenges in managing threats and responding to incidents in complex environments. This session explores the unique security challenges faced by colleges and universities, including decentralized infrastructures, diverse user bases, and evolving cyber threats. Attendees will gain actionable insights into building resilient security operations, improving visibility across cloud environments, and creating effective incident response frameworks. The discussion will include evidence-based strategies and best practices tailored to the higher education community. Learn how cloud-native tools can enhance threat detection, streamline incident response, and prioritize risk management to reduce attack surfaces and safeguard institutional missions. Whether you’re an IT security veteran or just starting to navigate the complexities of cloud security, this session offers practical solutions to address today’s pressing cybersecurity challenges in higher education.
11:40 – 11:50 a.m.
Expo Break & Session Change
11:50 a.m. – 12:50 p.m.
Around the Clock Security: Designing & Operating a 24/7 In-House SOC
Presenters: Luke Watson, ODU Deputy CISO & Moses Waithaka, Engineering Manager
Location: Center Cafe & North Cafe (1401 & 1402)
Old Dominion University built a 24/7 internal Security Operations Center (SOC) from the ground up—without relying on outsourced providers. This presentation will share how we planned, resourced, and now operate a fully in-house SOC that provides continuous monitoring, alert triage, and incident response. We’ll walk through key planning steps, strategic decisions, staffing models, and the operational processes that support our 24/7 coverage. Attendees will hear about the challenges we faced, the solutions we implemented, and the impact of building a model that aligns closely with our institutional mission and security priorities. This session offers a practical roadmap for organizations seeking to build or scale their own in-house SOC capabilities.

Use Responsible & Trusted AI Standards to Guide your Understanding of the AI Features in Cloud Applications
Presenter: Dr. Susan Clair, Dir of IT/ISO, Richard Bland College
Location: James River & Lynnhaven River Rooms (1303 & 1304)
There is an explosion of innovation in the Cloud application market! Cloud providers need to stay competitive in the EdTech market so they are integrating all forms of AI into their products. “Skate to where the puck is going” by learning how your current and future Cloud applications are integrating AI into their products and how this will impact your environment.

Building a Future-Ready Student SOC; Empowering Talent and Strengthening Campus Cybersecurity
Presenters: Rudy Falana, Sr Info Sec GRC Manager & Ryan Spoon, Glenda Scales, Joel Ojugo -Virginia Tech
Location: York & Potomac River Rooms (1305 & 1306)
This session will explore the strategic vision, operational framework, and impact of the Virginia Tech College of Engineering’s Student Security Operations Center (SOC). Attendees will learn how the Deans IT Department led the development of the SOC from concept to launch, including partnership strategies with Career Services and academic departments, use of Splunk and real-time alerting dashboards, phased onboarding of departments, and the implementation of incident escalation procedures that integrate with the broader university’s security architecture.

Two Sides of the Coin: Security for AI vs AI for Security
Presenter: ePlus
Location: Student Center Chambers (1302)
This session will explore the key tenets of security required for successful AI application adoption. As many organizations continue to both ideate and innovate and explore the use of AI in their environments its critical to understand the risks posed and the mitigations available to ensure that the necessary safeguards for responsible AI are in use. We will also then cover how innovations in the cyber technology space are “leveraging AI to secure AI”. Key highlights include:
• Understanding the threats posed against AI workloads
• Exploring the architecture of AI applications through a risk lens
• Discussing the power and risk of data within AI applications
• Reviewing current and future state of AI features in cyber security toolsets
12:50 – 2:00 p.m.
Lunch & VASCAN Service Panel: What Can VASCAN Do for You?
Presenters: Dan Han-VCU, Randy Marchany-VT, Kate Rhodes-ODU, V Kagey-JMU, Michael Grinnell-UVA, Matthew Dalton-GMU
Location: Center Cafe & North Cafe (1401 & 1402)
With some recent changes in community cybersecurity services such as MS-ISAC, the VASCAN steering committee would like to hear from our members on what your expectations are for VASCAN. This interactive session is designed to review the goals and mission for VASCAN, its current services and offerings, and for audience members to provide feedback to and discuss with the VASCAN steering community on what VASCAN can do to be more valuable for its members.
2:00 – 3:00 p.m.
The Holy Grail: The Search for the Perfect Inventory Record
Presenter: Randy Marchany, CISO, VT
Location: Center Cafe & North Cafe (1401 & 1402)
Virginia Tech recently its second risk assessment in 2 years. While some inventory questions were answered by these assessments, more questions have appeared. Some of these questions include a) given an IP address, how does one find the business process associated with that machine? How critical is that process to the university? Have all of the assets associated with a business process been recorded in the inventory database? What information categories (fields) should be included in a risk management asset inventory? Assets are not just hardware, software or even data. Linking hardware, software and data inventories to business process high level data flows is the new challenge in inventory management. This presentation will discuss some background and propose some ways to create a comprehensive inventory (the Holy Grail).

Identity and Access Management Moderization – JMU’s Story
Presenters: V Kagey, ISO JMU & Mamata Biswal, Greg Hackbarth
Location: James River & Lynnhaven River Rooms (1303 & 1304)
James Madison University recently procured and implemented Okta’s Customer Identity solution, migrating from multiple, legacy, on-premises solutions for identity management and sign-on. The story of this undertaking will highlight broader modernization efforts at JMU as well as topics specific to this project including background, product selection, project goals and system requirements, resource management, technological challenges, communication and support strategies, lessons learned, next steps, and more.  While the presentation and discussion center around an Identity and Access Management project, they are not product-centric, and attendees will find the lessons broadly applicable to many modernization projects.

Reconciling the Use of AI with the Human Cost Behind It
Presenter: Dr. Susan Clair, Info Sec Officer, Richard Bland College
Location: York & Potomac River Rooms (1305 & 1306)
As we recognize the advances of #AI—efficiency, innovation, transformation—we must also confront its darker side: how #BigTech treats the data workers powering these tools. We will discuss Reports, technology policy, and books by credible authors, that dig deeper into the moral, ethical, bias, and environmental issues of Artificial Intelligence. Participants will be asked to engage in conversations around: How are we reconciling our use of AI with the human cost behind it? What responsibilities do we have to ensure just and ethical practices throughout the AI supply chain?

Holistic Information Security
Presenters: Mary Stewart, Assoc Dir IT Risk & Compliance and Michael Surratt, VT
Location: Student Center Chambers (1302)
Discover how we’ve unified the efforts of the red, blue, purple, and green teams into a single, comprehensive security maturity score. This consolidated approach empowers organizational unit leaders to better prioritize security initiatives and strategically enhance their department’s overall security posture. Higher education institutions face unique cybersecurity challenges: decentralized IT environments, diverse compliance requirements, and constrained resources. Security responsibilities are often divided across specialized teams—Red (offensive/pen testing), Blue (defensive/vulnerability management), Green (governance/risk/compliance), and Purple (training/awareness). While each team adds value, their efforts often exist in silos, making it difficult to measure and improve the institution’s overall security posture. This session introduces a unified Security Maturity Score. This score is a collaborative, data-informed model that consolidates key contributions from each team into a single, actionable metric. Attendees will gain insight into how this model supports cross-functional alignment, drives better decision-making, and enables department leaders to identify priorities and improve their security readiness.
3:00 – 3:10 p.m.
Expo Break & Session Change
3:10 – 4:10 p.m.
Asset Inventory @ UVA
Presenter: Michael Grinnell, Deputy CISO UVA
Location: Center Cafe & North Cafe (1401 & 1402)
Followup presentation to 2019 “Growing Strong Roots” and 2023 “Asset Inventory @ UVA” sharing progress of Asset Inventory efforts in a decentralized environment. Highlights include: – graphs and dashboards – custom data tagging – other integrations

REN-ISAC Extended Services and the Role of OmniSOC
Presenter: Kyle Enlow, REN-ISAC Indiana Univ
Location: James River & Lynnhaven River Rooms (1303 & 1304)
This presentation highlights a range of services offered by REN-ISAC that go beyond the standard membership benefits. These include penetration testing, tabletop exercises, and general cybersecurity assessments aligned with the NIST Cybersecurity Framework (CSF) 2.0. Additionally, the presentation introduces OmniSOC as a new service arm of REN-ISAC, detailing some of the specialized services it provides.

From Chaos to Clarity: William & Mary’s Early Journey Toward GRC Maturity
Presenter: Pete Kellog, W&M CISO
Location: York & Potomac River Rooms (1305 & 1306)
This session will share the early-stage experience of William & Mary as it begins its transition from decentralized, manual GRC practices—managed through spreadsheets and Word documents—to a more structured, scalable approach using the Eramba SaaS platform. Attendees will gain insight into the university’s motivations for change, the selection of Eramba, a cost-effective and flexible solution, and the initial steps taken to implement foundational GRC workflows. The presentation will highlight early wins such as centralizing policy and risk documentation, automating review cycles, and improving visibility across departments.

Using Metrics to Drive Strategic Security Initiatives
Presenter: Mary Jane Bolling, Info Sec Officer, VA Dept of the Treasury
Location: Student Center Chambers (1302)
Establishing and reporting security metrics to identify program gaps and track remediation progress and barriers. This presentation will cover how to collect and present metrics that can be used to inform senior decision makers and support resource requests.
4:10 – 4:20 p.m.
Expo Break & Session Change
4:20 – 5:20 p.m.
Building a Cybersecurity Culture on Your Campus
Presenters: John Craft, UofR CISO & Svetla Walsh, Cybersecurity Analyst
Location: Center Cafe & North Cafe (1401 & 1402)
We will discuss the cybersecurity outreach and awareness activities we have performed at the University of Richmond to drive and build cybersecurity awareness. Consistency and collaboration with the campus community have been key factors contributing to our success. We will present the initiatives that worked (and those that did not) and discuss how they have improved cybersecurity awareness and driven recognition of the information security team across campus.

You Are Going To Be Lied To: Stories of Phishing, Smishing and More…
Presenter: Beth Lancaster, IT Security Analyst, VT
Location: James River & Lynnhaven River Rooms (1303 & 1304)
This presentation will share stories and samples of phishing, smishing, vishing and TOAD attacks.

Local to Cloud: Transitioning Security Policies for Cloud Endpoint Management
Presenter: Houston Griffith, Sr Manager Instructional Computing Services, VCU
Location: York & Potomac River Rooms (1305 & 1306)
This presentation will primarily focus on updating endpoint security and configuration policies that were once managed “on-prem” to a more modern way of managing endpoint configuration using Intune for Windows 11 client devices. A brief history of local and domain group policy will be covered and VCU’s unique application/usage of a “dual-policy” model for domain-joined Windows devices that are used both on-campus and off-campus. Additional review and exploration of our transition work to move all shared-device endpoints to our cloud-native endpoint management platform of choice, Intune, will be covered in-depth to show the steps taken to deliver a seamless transition from local to cloud management practices.

Journey Towards Secure SDLC
Presenters: Jacob Bushnell, Vulnerability Assessment Lead & Brian Johnson, Dir of IT Security Liberty University
Location: Student Center Chambers (1302)
This presentation shows our organization’s journey from a disconnect between IT Security and IT Development regarding goals and expectations for securing the Software Development Lifecycle (SDLC) to a budding partnership, with IT Security supporting IT Developments goals, and being available for feedback on security best practices. We’ll illustrate the initial challenges stemming from a lack of mutual understanding. Highlighting how we navigated these early difficulties to arrive at our current state.
5:30 – 7:00 p.m.
Dinner & Founder’s Award
Center Cafe & North Cafe (1401 & 1402)

Tuesday, October 14

8:00 – 9:00 a.m.
Registration & Breakfast
Center Cafe & North Cafe (1401 & 1402)
9:00 – 10:00 a.m.
Lessons Learned and Tips from American University’s Workday Implementation
Presenters: Eric Weakland, Dir Info Sec, & Jordan Maidman, American Univ
Location: James River & Lynnhaven River Rooms (1303 & 1304)
American University has over the last several years transitioned from Ellucian’s Colleague ERP to Workday’s SaaS offering for finance and human capital management. The presenters will share some of the lessons and opportunities that were found during this transition, including: Replicating erp controls from Ellucian to Workday: what worked and what didn’t; Monitoring workday tenants with Splunk; Addressing Direct Deposit attacks with visibility, notification, masking and step up authentication; Proxy usage; Security change activation; Kainos Smart Audit and Smartshield.

Bridging the Gap: Desktop Support’s Role in Cybersecurity: Highlighting how Desktop Support is a Frontline Defense in Cybersecurity/Streamlining Client Endpoint Investigations
Presenters: ODU, Scott Alexander, Jared Gibson, Vincent Mitchell & Chelsey Zirkle
Location: York & Potomac River Rooms (1305 & 1306)
Will cover how Desktop Support is a frontline defense in cybersecurity. Our dual functionality in providing support while also enforcing security. Identifying and Managing Legacy Systems Malware Remediation Ensuring Device Compliance End-User Security Education Collaboration with the Security Team. We will also discuss how “Alerts on desktops/laptops come in from a variety of sources. The benign are quickly weeded out. The more suspicious alerts are dispatched to the DSG team. In this session we will discuss how ODU -uses automation to create ServiceNow tickets -handles cases not dispatched by automation -colaborate on escalations We will also discuss how we prepare and train DSG for undertaking these investigation by using tools such as Crowdstrike University and in-house training.

Cyber Resilience in your Network
Presenter: Kevin Ekbatani, Arista Tech Solutions Engineer
Location: Virginia Rice Webb Room (1307)
Zero Trust – Understanding zero trust through the attack progression life cycle and incident response. How to Uncover and Contain Ransomware Before the Encryption Event? Going into the weaves on Maze ransomware and general techniques being used by adversaries Passwords Revealed: Xray Vision and Network Goggles: Everyone knows weak passwords are a risk, but what if I told you it doesn’t matter how strong your password is and can still be seen on the work.
10:00 – 10:10 a.m.
Expo Break & Session Change
10:10 – 11:10 a.m.
Let’s Discuss: Documentation on Service or Process – When do you find the time and why even bother?
Presenters: Edmond Cook & Vincent Mitchell, ODU
Location: James River & Lynnhaven River Rooms (1303 & 1304)
The Information Security Office at Old Dominion University always had documentation. Despite this, we still experienced challenges with updating and standardizing our documentation. To compound these challenges, new team members would also face difficulty as the processes may be unclear or lacking necessary elements such as screenshots. To remediate this, our Deputy CISO partnered with our team to establish a re-occurring Quarterly Documentation Day event for the security team where authors present documentation on their services and team members can ask questions and offer feedback on these processes. In this session, we will discuss with our attendees the story of how we improved our documentation process and the impact to that it’s had on our team. Attendees will receive a framework for implementing this for their own teams and are encouraged to share their own stories of documenting processes at their institutions.

Building a Cyber Threat Intelligence Program in Higher Ed
Presenter: Michael Gregg, Palo Alto Networks
Location: York & Potomac River Rooms (1305 & 1306)
As artificial intelligence accelerates both the speed of cyberattacks and the volume of threat data, the need for faster, more automated information sharing has never been greater. This session will discuss what’s required to establish a Cyber Threat Intelligence (CTI) program that enables higher education institutions to proactively detect, analyze, and respond to cyber threats.
Whether you’re building a CTI program, participating in threat sharing, or just trying to make sense of the buzzwords, this talk will give you a clear, structured, and actionable understanding of CTI’s full spectrum.
Speaker: Michael Gregg developed the nation’s first multistate intelligence sharing program while serving as CISO of North Dakota. Previous to that, he created a CTI program while working as an expat security leader. Michael has authored more than two dozen cyber security books and was awarded as a cyber security visionary in 2024.

Modernizing Vulnerability Management: Find & Fix – Freaky Fast!
Presenters: Melissa Bischoping, Sn Dir Security & Product Design Research & Margie Sills, Damian Architect – Risk & Compliance,Tanium
Location: Virginia Rice Webb Room (1307)
Vulnerability Management’ too often begins and ends with a collection of reports, dashboards, trends, and graphs that all tell the same story: we have too many bugs, too many apps, and not enough people to fix all the problems. It’s time we move beyond this approach and put our data to work with the power of automation. Scanning and reporting are only as valuable as the patching and remediation workflows they support. But why wait for scanning? Wouldn’t it be spectacular if you had vulnerabilities patched before your next scan even saw them? Organizations must pivot into action with data-driven, high-confidence actions to patch vulnerabilities almost as soon as they’re uncovered in the environment and without negative operational impact – closing the door on attackers who seek to capitalize on your uncertainty and blind spots. In this session, we’ll show how the power of high-confidence automation reduces your risk AND your cost of time, people, and money – allowing you to reclaim those resources for other workflows.
11:10 – 11:30 a.m.
Expo Break & Session Change
11:30 a.m.- 12:30 p.m.
The Stakes of Trust in a Digital World: Building Secure Innovation Together
Presenters: David Brassanini, SnMgr Chief Security Officer, Jon Durkos, David Farrell – Lenovo
Location: James River & Lynnhaven River Rooms (1303 & 1304)
In an era where students are digital natives, research is borderless, and threats are relentless, trust becomes both a strategic asset and a cultural cornerstone. This panel brings together leaders in technology, academia, and cybersecurity to share actionable insights and real-world models. We invite your institution to be part of a dialogue that will shape not just safer campuses, but a safer digital future. Panel topics will include:
1. The Stakes of Trust in a Digital World
2. Security Is Not a Feature—It’s the Foundation
3. Trust Through Transparency and Accountability
4. The Future of Secure Innovation

Cybersecurity inc the Commonwealth: Collaborations from the Classroom to the Capital
Presenter: Monroe Molesky, VA Dept of Emergency Management
Location: York & Potomac River Rooms (1305 & 1306)
Cyber resilience goes beyond the core cybersecurity best practices of individuals but requires preparedness, response, coordination, and collaboration amongst stakeholders to ensure the availability of critical services—such as the education, healthcare, and research missions of Virginia’s higher education institutions. In that context, this presentation will provide insight into the Commonwealth of Virginia’s whole-of-Commonwealth approach to cyber security and resiliency; examples of collaboration in cyber preparedness, incident response, and education; describe VDEM’s cybersecurity capabilities; and other approaches in facilitating the nexus of cybersecurity and emergency management for better cyber resiliency together.

The AI Threat Protecting Your Email from AI-Generated Attacks
Prseenter: Abnormal AI, speaker TBD
Location: Virginia Rice Webb Room (1307)

The battle for email security has evolved into an AI arms race, with attackers using intelligent agents to craft nearly undetectable threats while defenders deploy even smarter AI to hunt and neutralize them. This presentation reveals how agentic AI powers both sophisticated email attacks and our cutting-edge defense system that autonomously identifies threats conventional tools miss. See how real organizations have dramatically reduced successful phishing attempts through AI that thinks ahead of attackers, not just reacts to them.
12:30 – 1:30 p.m.
LUNCH & Prize Giveaways
Center Cafe & North Cafe (1401 & 1402)
1:30 – 2:30 p.m.
Becoming a Sawyer; Trimming Your Logs
Presenter: Michael Grinnell, UVA Deputy CISO
Location: James River & Lynnhaven River Rooms (1303 & 1304)
Presentation on how UVA and other schools are doing log management and focusing on improving logging scope, reducing log sizes, cutting costs, etc.

Getting Serious About Security: ODU and the Retention of Banner Records
Presenter: G. Mark Walsh, ODU University Records Manager
Location: York & Potomac River Rooms (1305 & 1306)
Banner is the application used by Virginia Higher Education for Academic, Financial Aid, Admissions, Financial and Personnel records. Although strongly protected, nothing is ever completely secure – so that observing retention periods for the record series on Banner becomes critical. This session will discuss how inactive files from one Registration Audit Table were deleted and what steps may be taken in other areas to reduce the amount of sensitive data, personally identifiable information, and regulated data in all areas of Banner through the use of existing records retention schedules provided by the Library of Virginia.

Virginia and the State and Local Cybersecurity Grant Program
Presenter: Mary Fain, Dir Info Sec Program Management – VITA
Location: Virginia Rice Webb Room (1307)
Virginia is an awardee of the State and Local Cybersecurity Grant Program. This presentation will provide insight into Virginia’s approach and philosophy, accomplishments and insights to date, and what’s planned for the future.
2:30 p.m.
ALL SESSIONS END

Tuesday, October 14 | Training Track

Linux Command-Line For Analysts and Operators
9 a.m. to 5 p.m.
Center Cafe & North Cafe (1401 & 1402)
Trainer will schedule breaks, in addition to lunch.
*MUST HAVE PRE-REGISTERED & PAID

TimePresentation Title
8:00 – 9:00 a.m.Registration & Breakfast
9:00 a.m. – 12:30 p.m.Training: Linux Command-Line For Analysts and Operators
12:30 – 1:30 p.m.LUNCH & Prize Giveaways
1:30 – 5:00 p.m.Training (Continued)