Welcome to KINBERCON 2019! Sponsors and Exhibitors, please set up your booths between 3:00-6:00 PM
Pennsylvania's only statewide IT conference for the research and education advanced networking community.
General workshops and lectures about technology, research, and innovation.
In depth discussions, workshops, and training on securing and protecting critical cyberinfrastructures.
Panels, discussions and sessions on broadband, including innovative broadband delivery to PA communities and broadband enabled opportunities.
Sessions, panels, and training focused on innovations in next generation networks and network based technologies and advancing research across Pennsylvania.
KINBERCON also offers half-day and full-day workshops on Wednesday with class sizes ranging from 15-40 attendees. Training sessions will run from 8:00 AM - 5:00 PM, 8:00 AM - 12:00 PM, or 1:00 PM - 5:00 PM with breakfast and lunch provided to all attendees. Topics will support the themes of Research, Broadband, and Security as well as technical training courses.
Being a sponsor has many benefits. All sponsors will receive an invitation to the Exclusive VIP Cocktail Reception Monday night, a 6’ exhibitor table at the Tuesday event (Platinum level receives a larger booth space), your logo on the meeting home page and print items, verbal recognition at the welcome session as well as social media acknowledgement, and a copy of meeting attendee contact list.
Welcome to KINBERCON 2019! Sponsors and Exhibitors, please set up your booths between 3:00-6:00 PM
KINBER Board Meeting (closed)
We are so grateful to our sponsors for making KINBERCON 2019 possible. We invite you to a Sponsor VIP Cocktail Reception as a way to thank you for your generosity.
Vendors, please set up your booths.
Registration table open.
Enjoy breakfast and networking. Visit with sponsors.
Join DVL, your local Vertiv office offering Liebert products, for a joint presentation with Harrisburg Area Community College. Recently HACC was facing challenges regarding Disaster Recovery Planning. A back-up data center was needed and the KINBER network was available. DVL assisted in making their disaster recovery plan a reality by designing and installing a complete data center infrastructure package. Learn the details behind the problems and the solutions that enabled them to be prepared for education IT in the 2020’s. Presenter(s): Geraldine Brennan, Solutions Sales Manager, DVL Group; David Shaffer, Harrisburg Area Community College
Hear an update from Sascha Meinrath, Palmer Chair in Telecommunications at Penn State University and the Director of X-Lab and KINBERCON 2018 Keynote Speaker on the broadband mapping initiative currently being conducted across Pennsylvania. Hear results to date and updates from the PA Broadband mapping team after the first 12 months of the effort. Presenter(s): Sascha Meinrath, Palmer Chair in Telecommunications, Penn State University
Indiana University of Pennsylvania (IUP) began creating a holistic IT security program following an accidental data exposure in 2012. This session will discuss the program, its six-year growth and maturity so attendees can leverage, modify and enhance it at their own institutions. Presenter(s): Bill Balint, CIO, Indiana University of Pennsylvania; Paul Grieggs, IT Security Manager, Indiana University of Pennsylvania
Hear an update on several of Pennsylvania's NSF-funded Campus Cyberinfrastructure CC* project activities. Presenter(s): Gwendolyn Huntoon, President and CEO, KINBER; Carrie Rampp, CIO, Franklin & Marshall College; Leslie Margolis, Interim CIO, Arcadia University; Vitaly Ford, Assistant Professor, Computer Science and Mathematics, Arcadia University; Param Bedi, Vice President, Library and Information Technology, Bucknell University
Be officially welcomed to KINBERCON 2019.
When most people think about Artificial Intelligence, images from Siri, to Watson, to HAL dominate the discussion. The lack of clarity, from technical and social perspectives, around what actually constitutes AI makes it difficult for computer scientists, information security, privacy, and legal practitioners to develop and agree upon frameworks and principles for its future development. This keynote provides an overview of AI concepts and examines some of the information security, privacy, and legal issues that will influence the future development of AI. Keynote Presenter: Joanna Grama, JD, CISSP, Senior Consultant, Vantage Technology Consulting Group
Morning break and visit with vendors.
Institutions in Pennsylvania are encouraged to consider implementing IPv6 on their networks in order to avoid leaving their institutions solely connected to a depleted Internet technology. IPv6 guarantees users' connectivity to services of tomorrow which will lack IPv4 connectivity. Hear perspectives from higher education and K12 in PA. Presenter(s): Kevin Partridge, Assistant Director, IT Infrastructure Services, West Chester University; Mike Graham, Director of Information Technology, Hempfield School District
Congress and the Trump Administration are both considering major broadband infrastructure legislation this year, and the SHLB Coalition has prepared its own draft bill promoting broadband investment focused on anchor institutions. SHLB is also working actively on a host of other broadband issues, including E-rate reform, Rural Health Care funding, and Educational Broadband Services (EBS). This presentation will review all of these developments, with a particular focus on their impact on educational networks. Presenter(s): John Windhausen, Executive Director, Schools, Health and Libraries Broadband Coalition (SHLB)
Cloud is fundamentally changing how we need to be approaching cybersecurity. Digital transformation has pushed our organizations to adopt technologies that stretch beyond the traditional network boundaries and the attack techniques used against our organizations have transformed as well. Join Sean Sweeney from Microsoft, a former Higher Education CISO, in a review of the cybersecurity transformation that is occurring, the evolution of the threat landscape, and the new imperatives that allow organizations to operate in cloud securely. Presenter(s): Sean Sweeney, Americas Director & Chief Security Advisor, Microsoft’s Cybersecurity Solutions Group
Hear updates from NSF CC* PIs and project teams working on advanced regional research projects including ERN, Data Infrastructure Building Blocks (DIBBs) Virtual Data Collaboratory, and the NRP Pilot. Presenter(s): Gwendolyn Huntoon, President and CEO, KINBER; Forough Ghahramani, Associate Director, Rutgers Discovery Informatics Institute (RDI2), Rutgers University, J. Barr von Oehsen, Associate Vice President, Office of Advanced Research Computing, Rutgers, The State University of New Jersey
Morning break and visit with vendors.
Whether you are interested in building a private network, leasing circuits or IRUs for dark fiber, this presentation will break down the steps required to build a fiber optic network—addressing the topics of planning & budgeting, make ready & permitting, aerial & underground construction and continued service and maintenance of fiber optic networks. This presentation is recommended for anyone that is interested in the process of how fiber optic networks are designed, permitted and built. The approach to the subject matter will be straightforward enough for novice to comprehend, but technical enough in nature to appeal to those more seasoned in connectivity solutions. Presenter(s): Deron Leight, Vice President ; Jeff Whitman, Network Solutions Advisor, Celerity
This session will explore AI, converging technologies, and what the future of AI holds for cybersecurity. What is "AI-machine based learning” and how does Fortinet use this today to add security. Where is AI in the Fortinet story and how it relates to protecting your current and future environment. Presenter(s): Keith Rayle, Strategist, Fortinet, Inc.
Don't miss this panel on the increasingly popular E-Sports activities at colleges and universities across PA. Learn about the PA E-Sports Coalition [https://www.paesports.org/] and how schools are leveraging advanced technologies and infrastructures to support competitive e-gaming. Presenter(s): Bill Thomas, Chairman, PA E-Sports Coalition; Chad Smeltz, Director of E-Sports, Harrisburg University
The Engagement and Performance Operations Center (EPOC) is a production platform for operations, applied training, monitoring, and research and education support. Learn more about how EPOC provides researchers with a holistic set of tools and services needed to debug performance issues and enable reliable and robust data transfers. By considering the full end-to-end data movement pipeline, EPOC is uniquely able to support collaborative science, allowing researchers to make the most effective use of shared data, computing, and storage resources to accelerate the discovery process. Presenter(s): Jason Zurawski, ESnet
Network and socialize over lunch. Visit with vendors.
Women CEOs and CIOs share their perspectives on the ascension to IT leadership and inclusivity initiatives that encourage diverse participation and promotion in IT. Panelists will discuss their views and experiences with gender bias, how best to handle it, and how best to prepare the next generation of women IT leaders. Learn about the Women in IT Networking at SC (WINS) initiative, an effort to expand the diversity of SCinet volunteer staff and provide professional development opportunities to highly qualified women in the field of networking and other initiatives aimed at promoting inclusivity in the field. Presenter(s): Gwendolyn Huntoon, President and CEO, KINBER; Susan Bowen, Associate Vice President for Information Technology, Chief Information Officer, University of Scranton; Dr. Celeste Schwartz, Vice President for Info Tech & Chief Digital Officer, Montgomery County Community College
Broadband success stories from Pennsylvania will focus on how communities (rural, municipal and urban) are partnering together to bring broadband to underserved areas in PA. Presenter(s): Jeff Luck, Former Patton Township Supervisor (2006-2017) and Technology Lead, WPSU; Jennifer Wakeman, Executive Director, DRIVE
This session will help you understand the risks associated with vendor management and how to mitigate these risks and plan for successful, strategic vendor partnerships at your organization. Presenter(s): Mark Purcell, Executive Director of IT Security and Compliance, La Salle University
Explore the benefits of voice control and AI in today’s dynamic classrooms, including freeing faculty from the traditional podium and increasing ADA compliance. This session will end with a live interactive demonstration of how Amazon’s Alexa and the Alexa Classroom Skill can perform complex classroom technology commands at the request of faculty and students. Presenter(s): Robert Kennedy, University of Scranton
Afternoon break and visit with vendors.
Join Platinum Sponsor, Integration Partners, for this session on how Ethernet-Based Fabric Networking delivers a simplified, agile and resilient infrastructure that makes network configuration and deployment of new services faster and easier--providing a network foundation for SDN and the automation promised by the industry. Presenter(s): Perry Heliger, Sr. Solutions Architect, Integration Partners; Chris Kolb, Senior Account Executive, Integration Partners
This session will explore the benefits of a strategic platform-driven approach to leveraging unstructured machine data for various use cases across Higher Education. We will focus not only on well-known use cases like Security Incident and Event Management (SIEM) and Application Performance Management (APM) but also explore the value of unlocking insights hidden in data exhaust for Student Success Analytics and Strategic Planning. Presenter(s): Tim Naylor, Director Mid-Atlantic @ Splunk Higher Education + State & Local
According to Verizon’s Data Breach Investigations Report (DBIR), credential theft is one of the single biggest factors contributing to security breaches with over 81% of hacking-related breaches leverage stolen and/or weak passwords. In this breakout session, we will explore the lifecycle of credential theft and abuse, various techniques and technologies which can be adopted with the aim of neutralizing the risk of credential theft and credential leakage, and how to better improve your security posture with the aim of reducing security breaches. Presenter(s): Stefan Fouant, Director of Technology and Cloud Strategy, Sun Management
Update on what's new at Internet2 including advanced network capabilities, new research engagement initiatives such as the NSF-funded E-CAS program, and other research support resources for organizations in Pennsylvania. Presenter(s): George Loftus, Associate Vice President Business & Relationship Management, Network Services; Nili Tannenbaum, Director of Sponsored Research Administration
Closed meeting of the PASSHE CITOs. (By invitation only)
Afternoon break and visit with vendors.
Update on the state of the PennREN network both today and as we look toward the next 10 years. Presenter(s): Gwendolyn Huntoon, President and CEO, KINBER
NCFTA is currently working with several universities in an effort to better integrate an operational element into academic curriculum. In his presentation, NCFTA will cover a few ongoing threats that are challenging industry and provide examples as to how NCFTA is preparing students to better contribute to solutions immediately upon graduation. Presenter(s): Tara Trickett, NCFTA
This high-level beginners’ talk will focus on the emerging DR, MDR and Mitre Att&ck technology. Presenter(s): Tim Miller, Sales Engineer, Trend Micro
In this session we will introduce VMware Cloud on AWS to deliver a seamless hybrid cloud by extending your on-premises vSphere environment to the AWS Cloud. VMware Cloud on AWS is an integrated hybrid cloud offering jointly developed by AWS and VMware. It delivers a highly scalable, secure and innovative service that enables organizations to seamlessly migrate, extend and provide disaster recovery for their on-premises VMware vSphere-based environments to AWS. Presenter(s): Paul Schlosser, Staff Solution Engineer, VMware
Afternoon break and visit with vendors.
Closing Keynote by the Honorable Pam Snyder, Member of the Pennsylvania House of Representatives, serving since 2013. She represents the 50th district. Snyder is the co-founder (along with Rep. Kristin Phillips-Hill, R-York) of the PA legislature’s Broadband Caucus which is working legislation to tackle the lack of modern, high-speed internet, which puts 800,000 Pennsylvanians – including 520,000 in rural areas, at a disadvantage. KINBER is pleased to be honoring Rep. Pam Snyder with the KINBER 2019 Broadband Champion Award during the closing keynote.
Socialize and network with attendees during the General Reception.
An introduction to Border Gateway Protocol (BGP) followed by advanced hands on BGP exercises using Cisco and Juniper via instructor led training. Note: BGP 101 & BGP 201 can be taken individually or as an all-day workshop. Presenter(s): Peter Southwick, Senior Solutions Architect, Integration Partners
Morning tour at Netrality Data Centers at 401 N. Broad Street. Get an inside look at Netrality Data Centers’ state-of-the-art, carrier and cloud neutral telecommunications facility at located at 401 N. Broad Street, just minutes away from the conference hotel. Take an open air trolley past City Hall and down Broad Street to visit KINBER's eastern Point of Presence (POP), tour the KINBER Research & Education cage and colocation facility, and enjoy a guided tour of this world-class data center co-hosted by Netrality and KINBER. Tours are offered on Wednesday April 3 and are part of KINBERCON conference admission but separate registration is required. Trolley leaves the hotel to depart for Netrality Data Centers at 8:15 a.m.
Part 2 of the Border Gateway Protocol (BGP) workshop builds on the BGP 101 workshop and will feature a deeper dive into advanced configuration with hands on exercises and additional instructor led training. Workshop Note: BGP 101 & BGP 201 can be taken individually or as an all-day workshop. Presenter(s): Peter Southwick, Senior Solutions Architect, Integration Partners
This customized workshop will provide attendees with the foundation knowledge needed to deploy and operate IPv6 in an academic environment. Instruction topics include, but are not limited to the following: Addressing, Architecture, Capabilities, Configuration, Features, Header Translation, Integration, Migration Planning, Packet Generation, QoS, Routing, Security, Specification, Transition Mechanisms, Troubleshooting, and Tunneling. This coursework is approved and certified by the IPv6 Forum. Presenter(s): Brandon Ross, Network Utility Force
This highly interactive workshop, hosted by the NSF CC* funded Engineering and Performance Outreach Center (EPOC) [https://epoc.global] will present a process that can be adopted by Cyberinfrastructure (CI) facilitators to advance the mission of science engagement. Establishing a process to regularly review network requirements (http://www.es.net/science-engagement/science-requirements-reviews/) helps to determine the current and future science communication and collaboration needs for numerous communities. The purpose of these reviews is to accurately characterize the near-term, medium-term and long-term network requirements of the science being performed. This approach brings about a network-centric understanding of the science process used by the researchers and scientists, without asking technical questions directly, and derives network requirements from that understanding. Presenter(s): Jason Zuraski, Energy Sciences Network (ESnet) / Lawrence Berkeley National Laboratory; Hans Addleman - International Networking at Indiana University (IN@IU)
The Toward Gigabit Libraries in PA Workshop will offer libraries and library systems the opportunity to learn about the Broadband Toolkit and resources from KINBER and other library service providers available to support libraries in their ever increasing role as "digital hubs" in their communities through the use of broadband networks and advanced services.
Join Trend Micro for this half-day threat defense competition in which you will get to collaborate with peers in an attempt to defend an infrastructure against attackers, using industry-leading security capabilities from Trend Micro. This will not be your typical product training session! There will be loads of action instead of dull presentations. Presenter(s): Tony Allegreti, Sales Engineer, Trend Micro
Taking time to think through important processes and strategies related to the technology needed by each community anchor institution is essential. Planning for E-rate affects a lot in the day-to-day operations. In this session, we’ll cover basic questions about the E-rate process, discuss big picture strategy to utilize E-rate to meet goals (including a review of some strategies for background research of current trends in rates for services), take a look at what is going on at the FCC, and tackle challenges and problems. Presenter(s): Heather Mills, CTC Technology & Energy
Morning tour at Netrality Data Centers at 401 N. Broad Street. Get an inside look at Netrality Data Centers’ state-of-the-art, carrier and cloud neutral telecommunications facility at located at 401 N. Broad Street, just minutes away from the conference hotel. Take an open air trolley past City Hall and down Broad Street to visit KINBER's eastern Point of Presence (POP), tour the KINBER Research & Education cage and colocation facility, and enjoy a guided tour of this world-class data center co-hosted by Netrality and KINBER. Tours are offered on Wednesday April 3 and are part of KINBERCON conference admission but separate registration is required. Trolley leaves the hotel to depart for Netrality Data Centers at 12:15 p.m.
Aligning technology investments to meet the needs of todays "connected" generation is fundamental to fulfilling our strategic plans. But implementing key parts of the plan can be challenging. How do we innovate to meet student demand, enhance the learning-living experience, and create a sustainable business model—all at the same time? In this workshop, Rajiv Shenoy, Chief Technology Officer at Apogee, Higher Education’s Largest Managed Technology Provider, will address the inescapable transformations technology have required of public institutions large and small. It will also shed light on how technology can help drive the future of teaching, learning, research and the entire university experience to achieve our strategic plans. Following the talk will be a panel discussion with KINBER institutions and Apogee customers on how they are navigating the challenging waters of technology to drive the student experience and keep their institutions competitive. Presenter(s): Rajiv Shenoy, Chief Technology Officer, Apogee (Moderator), A.J. Lacomba, VP for Information Technology & CIO, Penn College of Technology; Mayumi Hirtzel, IT Project Leader, University of Pennsylvania
Library Carpentry is a volunteer community of instructors and lesson developers who teach workshops using crowdsourced, open access lesson materials and according to the The Carpentries pedagogy. Library Carpentry develops lessons and teaches workshops for and with people working in library- and information-related roles. Our goal is to create an on-ramp to empower this community to use software and data in their own work as well as be advocates for and train others in efficient, effective and reproducible data and software practices. In this workshop we will be busting jargon, explaining commonly used terms that we use in our work, learning how to use OpenRefine for wrangling with and cleaning messy data, and discussing getting involved with Library Carpentry. Presenter(s): Joshua Dull, Digital Scholarship Specialist, Digital Scholarship Services / StatLab, Yale University Library
The Network/Security Risk Analysis and Strategic Planning workshop provides an in-depth opportunity to work with nationally renown networking and security leaders to conduct a risk-based assessment of your network and security environment and use the analysis to plan strategically for the future. The workshop will use network and security assessment models developed and used by Indiana University and REN-ISAC to focus on a consideration of costs, risks, benefits for planning campus wide area network connectivity and enhanced security. Specific topics to be covered will include architectural options for providing connectivity to public cloud workloads, options for extending on-prem security controls to cloud-based workloads, best practices for network operators including adherence to MANRS (Mutually Agreed Upon Norms for Routing Security) principles; and common problem areas perceived in higher education security operations, establishing a campus security plan, and entertaining an objective campus security assessment. Presenter(s): Steven Wallace, Enterprise Network Architect and Technical Adviser Networks, Indiana University; Mark Bruhn, Peer Assessment Engagement Manager REN-ISAC.net
The Introduction to Network Automation Workshop will provide a brief introduction to network automation and highlight some common tools, such as Ansible. Familiarity with Linux CLI, YAML and Jinja2 is helpful but not required. Participants will need to bring a laptop and will be working with a virtual development environment. This workshop is a joint presentation of Internet2, KINBER, and the Global NOC. Presenter(s): Grover Browning, GlobalNOC @ Indiana University
As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. Gartner estimates that by the end of 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. Come explore real-world scenarios and learn how Next Generation Firewalls can leverage threat intelligence security services to protect and defend many of the most vulnerable threat vectors, including those that encrypt traffic. This session will focus on how to reduce complexity by integrating various vector specific point products into a NGFW with the capability to automate action and enhance visibility into applications, users and the network. Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with full featured NGFW solution. Presenter(s): Kian Yeylaghi, Systems Engineer, Fortinet
Splunk KINBER User Group This session will connect all of the regional institutions currently using Splunk within their IT departments to share best practices, develop new use cases and derive as much value as possible from a machine data platform. Introductions and brief overview of current Splunk deployment from each attending institution Deep Dive on 3 use cases: Information Security, Compliance, End to End Application Performance Monitoring Splunk Roadmap: Overview of newest or soon-to-be-released features Center of Excellence: Tools and strategies for developing a “Splunk practice” that supports the healthy/organized proliferation of Splunk across multiple departments while maintaining centralized control/visibility Speaker: Craig Vincent- Lead Technical Strategist @ Splunk Higher Education + State & Local
Come spend 2-4 hours enabling your very first Zero Trust application with our Akamai team. The perimeter security model isn't working and has you playing whack-a-mole. Akamai's Zero Trust model improves your security posture by forcing all users to be authenticated & authorized before accessing applications and data, eliminating dangerous lateral movement and greatly reducing your attack surface. Enable MFA and SSO in minutes, improve performance, and proactively prevent malware and exfiltration attacks at the DNS-level. Protect your organization in minutes while reducing cost with Akamai's Zero Trust solution. Presenter(s): Dane Teschner, Sayed Ahmad, Advanced Technology Group, Akamai
Joanna Grama has more than 15 years of experience in higher education with a strong focus in law, IT security policy, compliance, governance and data privacy. She is a member of the U.S. Department of Homeland Security’s Data Privacy and Integrity Advisory Committee and serves as the chairperson of its technology subcommittee. A prolific author and frequent public speaker on information security and privacy issues, Joanna is a Senior Consultant at Vantage Technology Consulting Group where she advises higher education clients on information security, privacy, and risk management issues.
Pam Snyder is a Democratic member of the Pennsylvania House of Representatives, serving since 2013. She represents the 50th district. Snyder previously served for nine years as a Greene County Commissioner. Snyder is the co-founder (along with Rep. Kristin Phillips-Hill, R-York) of the PA legislature’s Broadband Caucus which is working legislation to tackle the lack of modern, high-speed internet, which puts 800,000 Pennsylvanians – including 520,000 in rural areas, at a disadvantage. Snyder is dedicated to bringing modern, high-speed internet to areas of the state that currently lack a level of service deemed critical to remaining economically, medically and personally competitive. Snyder will be receiving the KINBER 2019 Broadband Champion Award.