KINBERCON 2018 is a two-day event that brings together hundreds of Pennsylvania’s leaders in education, healthcare, economic development, libraries, public media, government and technology to share ideas and success stories about using next generation networks and technology.


Register today for KINBERCON April 23-25, 2018 in Harrisburg-Hershey, PA! Reserve your hotel accommodations at the Sheraton Harrisburg-Hershey before April 2nd to get the $129/night discounted rate. Exhibitor and Sponsor spots are SOLD OUT!


Pennsylvania's only statewide IT conference for the research and education advanced networking community.


General workshops and lectures about technology, research, and more.


In depth discussions, workshops, and training on cybersecurity.


Workshops and technical training focused on innovations in next generation networks and network based technologies.


Panels, discussions and sessions on community networks, communities of practice and community enabled initiatives in PA.

Register for KINBERCON

KINBERCON also offers half-day and full-day workshops on Wednesday with class sizes ranging from 15-40 attendees. Training sessions will run from 9:00 AM - 5:00 PM, 9:00 AM - 12:00 PM, or 1:00 PM - 5:00 PM with breakfast and lunch provided to all attendees. Topics will support the themes of Cybersecurity, Innovation, and Community as well as technical training and certification courses.


Being a sponsor has many benefits. All sponsors will receive an invitation to the Exclusive VIP Cocktail Reception Monday night, a 6’ exhibitor table at the Tuesday event (Platinum level receives a larger booth space), your logo on the meeting home page and print items, verbal recognition at the welcome session as well as social media acknowledgement, and a copy of meeting attendee contact list.

2018 Conference Schedule

  • monday04/23/2018
  • tuesday04/24/2018
  • wednesday04/25/2018
4:00-7:00 PM

Sponsor and Exhibitor Set Up

6:00-8:00 PM

Sponsor VIP Cocktail Reception

We are so grateful to our sponsors for making KINBERCON 2018 possible. We invite you to a Sponsor VIP Cocktail Reception as a way to thank you for your generosity.

7:00 AM

Vendor Set Up

7:30 AM

Registration Begins

Registration table open.

7:30-8:30 AM


Enjoy breakfast and networking. Visit with sponsors.

7:30-8:30 AM

PennREN Technical User Group

PTUG Breakfast Meeting

8:30-9:15 AM

Breakout Session 1

Governor's Broadband Initiative -- TIER Campus Success Program -- K12 Cybersecurity Roadmap -- Data Infrastructure Building Blocks (DIBBs) Virtual Data Collaboratory


Welcome and Opening Keynote

Be officially welcomed to KINBERCON 2018 by Wendy Huntoon, President and CEO. Opening Keynote Speaker, Charlie Gero, CTO Enterprise Division, Akamai Technologies


Break and Vendors

Morning break and visit with vendors.


Cybersecurity Working Group

Cybersecurity Working Group (open)


Breakout Session 2

TV Whitespace, Wireless Solutions Panel -- Building a Private On-Campus Fiber Network: Lehigh University Case Study -- Enhancing the Security Fabric -- Connected Nation/Grant Funding --


Collaborative Video Working Group

Collaborative Video Working Group Meeting (open)


Break and Vendors

Morning break and visit with vendors.


Breakout Session 3

State of the PennREN Network -- Certification Over a Semester: The Academy Program Approach to Early Certification of Students -- National Cyber Forensics and Training Alliance Educating the Security Workforce of Tomorrow -- IPv6: What You Need to Know and Do Now Before It's Too Late


Research Engagement Advisory Committee

Research Engagement Advisory Committee Meeting (Invitation Only)

12:30-1:30 PM


Network and socialize over lunch. Visit with vendors.

1:30-2:15 PM

Breakout Session 4

National Broadband Landscape for Schools, Libraries, Healthcare (SHLB) -- Last Mile Panel -- Cybersecurity and the Intersection of Campus/Enterprise IT -- North East Big Data Innovation Hub Update -- Research & Education Networks: A Path Towards Cognitive Networking

2:15-2:30 PM

Break and Vendors

Afternoon break and visit with vendors.

2:30-3:15 PM

Breakout Session 5

KINBER Services Panel: DDoS Mitigation, Managed Router, Amazon Direct Connect, Colocation -- Women CEO and CIO Perspectives on IT Leadership -- Mobile Service Provider Integrated Security for the Internet of Things -- SD WAN -- Connected Communities

3:15-3:45 PM

Break and Vendors

Afternoon break and visit with vendors.

3:45-4:15 PM

Breakout Session 6

Internet2, The Quilt, and Statewide Research & Education Networks Panel -- Healthcare Information and Management Systems Society (HIMSS) Panel -- Plan Today for Tomorrow's Security Issues -- Municipal Broadband Success Stories in Pennsylvania --

4:15-4:30 PM


Afternoon break.

4:30-5:00 PM

Closing Keynote

Closing Keynote: PA Rural Broadband Initiative, Sascha Meinrath, Palmer Chair in Telecommunications, Penn State University

5:00 PM

Remove Vendor Booths

All vendor booths must be removed.

6:00-8:00 PM

General Reception

Socialize and network with attendees during the General Reception.


Security on a Shoestring Workshop


BGP 101 Workshop

Workshop Presenter(s): Peter Southwick, Senior Solutions Architect, Integration Partners; Shawn Jacobsen, Solutions Architect, Integration Partners Workshop Description: An introduction to Border Gateway Protocol (BGP) and hands on BGP exercises using Cisco and Juniper.


Cisco CyberThreat Response Clinic

Workshop Presenter(s): Greg Girgenti, Cybersecurity Sales Specialist, Cisco; Ed McNicholas, Security Engineer, Cisco Workshop Description: In today’s complex security environment, security professionals need to evolve their strategy from a point-in-time approach to pervasive and continuous protection across the full attack continuum. Network professionals need to understand how their network infrastructure can be used as a sensor and enforcer to help improve network security and prevent data breaches. In this workshop, you will experience common cyber security attack situations in a virtualized lab where you will get to play both the role of attacker and defender. Utilizing a structure that models many enterprise networks, you will learn how systems get compromised, how breaches can be discovered quickly, and how to respond most effectively with an architectural approach to security.


Strategic Planning with E-Rate for the Library of the Future

Workshop Presenter(s): Joann Hovis, CEO, CTC Technology & Energy; Heather Mills, Director of Operations, CTC Technology & Energy Workshop Description: Taking time to think through important processes and strategies related to the technology needed by each library is essential. All libraries are as unique as the patrons and communities they serve. How those libraries plan for E-rate affects a lot in the day-to-day operations of any library. In this session, we’ll cover basic questions about the E-rate process, discuss big picture strategy for libraries in general looking to utilize E-rate to meet goals (including a review of some strategies for background research of current trends in rates for services), take a look at what is going on at the FCC, and tackle unique problems Libraries face in serving their patrons and communities through E-rate.



Workshop Presenter(s): Perry Heliger, Senior Solutions Architect, Integration Partners Workshop Description: This customized workshop will provide attendees with the foundation for the silver IPv6 certification exam at the end of the course. IPv6 instruction topics include, but are not limited to the following: Addressing, Architecture, Capabilities, Configuration, Features, Header Translation, Integration, Migration Planning, Packet Generation, QoS, Routing, Security, Specification, Transition Mechanisms, Troubleshooting, and Tunneling. This coursework is approved and certified by the IPv6 Forum.


BGP 201

Workshop Presenter(s): Peter Southwick, Senior Solutions Architect, Integration Partners; Shawn Jacobsen, Solutions Architect, Integration Partners Workshop Description: Part 2 of the BGP workshop builds on the morning BGP 101 workshop and will feature a deeper dive into advanced configuration with hands on exercises and additional instructor led training.


Leveraging Splunk to Support the NIST Cybersecurity Framework (CSF)

Workshop Presenter(s): Splunk Workshop Description: Cybersecurity incidents around the world have put nation-states on alert. In the U.S., Trump’s executive order has directed federal agencies to follow risk assessment standards established by the National Institute of Standards and Technology (NIST), with NIST Cybersecurity Framework (CSF) at their core. Now, public entities have the enormous task of ensuring that they are staying up to date and meeting these security industry standards.


Fiber to the Edge: How Technology Connects Communities

Workshop Presenter(s): Elwood Downing, Principal/Owner ELAE Enterprises, LLC; Brian Proffit, VP Business Development and Smart Cities, Adtell; Dustin LaPointe, Owner Great Lakes Networking; Deron Leight, VP, Celerity Workshop Description: This workshop will present attendees with tools and strategies to better understand how to buy, build or wirelessly connect their institution and the greater community.


Securing Your Connected World: Cloud Friendly Security

Workshop Presenter(s): Trend Micro, Inc. In the cloud, you can’t use traditional perimeter security tools. You need security built for the cloud that protects but won’t impact agility and access. Learn about tools that optimize security for environments such as Microsoft Azure, VMWare Cloud, AWS and others.


GDPR: Tomorrow's Compliance Challenges

Workshop Presenter(s): Michael Giordano, CISSP, Principal Security Architect, Dyntek Workshop Description: As GDPR requirements begin to take effect, accurately identifying and securing your data is more challenging than ever. As the amount of organizational data continues to grow rapidly, security teams are simultaneously facing new compliance and regulatory mandates that require greater insight and visibility into data than ever before. To overcome these challenges, it’s more critical than ever that IT discovers new approaches to identifying all of their organization’s data and providing security wherever that data resides. In this workshop, join DynTek Services and Digital Guardian for an eye-opening look at the future of data security and threat prevention.


Sascha Meinrath
Internet Freedom Activist. Founder of X-Lab. Co-Founder of M-Lab. Palmer Chair in Telecommunications at Penn State University

Sascha Meinrath is a renowned technology policy expert who has been named to the Time Magazine “Tech 40” as one of the most influential figures in technology; to the “Top 100” in Newsweek’s Digital Power Index; and received the Public Knowledge IP3 Award for excellence in public interest advocacy. Meinrath is the Palmer Chair in Telecommunications at Penn State University and the Director of X-Lab, an innovative new venture focusing on thought-provoking, bold tech policy interventions. Meinrath also co-founded Measurement Lab "M-Lab", a global online platform for researchers to deploy internet measurement tools that empower the public and key decision-makers with useful information about broadband connectivity. Meinrath has been selected to lead a team that has started an 11-month study of broadband access in rural Pennsylvania, an endeavor that could impact hundreds of thousands of residents of the Commonwealth.

Charlie Gero
Cybersecurity Expert. Entrepreneur. Zero Trust Evangelist. Chief Technology Officer, Enterprise and Advanced Projects Group, Akamai Technologies

Charlie Gero has worked in security, networking, and the software engineering fields for 20 years, with a decade spent at Akamai. Prior to Akamai, Charlie was an entrepreneur and served in key computer science positions within the pharmaceutical and networking industries. Currently the CTO of the Enterprise Division, Charlie has also served as lead of the advanced R&D group at Akamai and holds many patents in the areas of cryptography, distributed systems, compression, and more. Charlie brings a wealth of deep technical experience in security and networks and has degrees in Physics and Computer Science from Moravian College.

Why attend KINBERCON?

  • A streamlined schedule format featuring a day of breakout sessions across four tracks – General, Cybersecurity, Innovation, and Community
  • A full day of technical training opportunities
  • Dozens of panels and technical workshops
  • Keynote speakers
  • An evening gala networking reception


Our Sponsors