Speakers

Morning Keynote Speaker - Amber MacArthur

Amber MacArthur Copy2AMBER MAC is a writer, podcaster, entrepreneur and digital maverick whose understanding of disruptive technologies helps organizations anticipate lightning-quick changes as they come—from Artificial Intelligence, to social media, to Amazon-era retail. Mac asks, “if it’s so easy to disrupt, the question we need to ask ourselves is why isn’t everyone doing it?” No matter how confident and established the organization, everyone needs a blueprint—and Mac’s talk provides you with just that. 

Disruption means to interrupt the normal course of things, and Amber Mac is especially fluent in the art of disruptive strategies. Mac started her career in San Francisco and Boston during the dot-com boom in the late 1990s. What others thought was a trend, she recognized as an explosion. As a strategist for Razorfish and Director of Marketing for an e-procurement software company, she spent four years in the technology start-up trenches. Mac eventually left the start-up world to join Microsoft to build one of the first female-focused lifestyle portals. Then, she launched her own digital media agency. The company’s first client was world-renowned business coach Tony Robbins. Since then, her client list also includes Microsoft, Intel, Shopify, Ford, Nintendo, GE, Fast Company, PayPal, Scotiabank, and many more leading organizations. 

An insatiable media adopter, Mac is currently host of the top-rated podcast, The AI Effect, now in its second season. The AI Effect explores the Canadian AI ecosystem and the extraordinary pace of its technological growth, focusing on the rewards and perils for individuals, businesses, and society. With her co-host, Jodie Wallis of Accenture, Mac interviews guests like Prime Minister Justin Trudeau, Joelle Pineau of the Facebook AI Research Lab, Toronto Mayor John Tory, and many others about the challenges and benefits of AI adoption in Canada.

Mac is the author of the national bestseller Power Friending and Outsmarting Your Kids Online. Mac has delivered keynotes at more than 300 events around the world, including an event this spring where she interviewed PM Justin Trudeau and Shopify CEO Toby Lutke about the future of digital. Mac’s expertise includes business innovation, artificial intelligence, the distraction economy, and what it takes for companies to adapt and grow. In 2018, DMZ named Amber one of 30 inspirational women making a difference in tech. She is a regular business host and expert for Fast Company, Shopify, CNN, Bloomberg TV, CBS, BNN, The Marilyn Denis Show, and SiriusXM Radio and has more than two million social media followers online.

Title:

"Relentless Adaptation - How Great Organizations Are Really Innovating to Win"

Abstract:

We obsess over innovation. But innovation is overrated. If you look at the smart companies and organizations that are prized for “innovation,” you see that they are actually masters of “adaptation”—of knowing when to adjust, when to speed up, and when to capitalize. It’s not about being first; it’s about being flexible. In this thrilling new talk, Amber Mac looks to leading organizations, many of which she covers for Fast Company, to explore the practice of relentless adaptation. Is your institution taking advantage of disruptive new technologies, or simply being disrupted by them? From the administration to student services to the classroom and beyond, a newly adaptive corporate culture, defined by digital technology and bold leadership, is fundamentally changing business. And Amber Mac has had her ear to this fertile new ground for years. Fusing new concepts like crowdsourcing and gamification to a timeless strategic framework, this big picture talk sheds light on how to adapt, and how to win, in our fast-forward economy.

 


Lunch Keynote Speaker - David Seidl

David Seidl is the Vice President for Information Technology and CIO at Miami University of Ohio. Prior to taking his role at Miami, David co-led the University of Notre Dame's David Seidl cropped2move to the cloud, successfully moving over 80% of Notre Dame's services to the cloud, and allowing Notre Dame to shut down its primary campus datacenter. During his IT career, he has served in a variety of technical and information security roles including serving as the Senior Director for Campus Technology Services at the University of Notre Dame and leading Notre Dame’s information security team as Notre Dame’s Director of Information Security. David has taught college courses on information security, holds CISSP, GPEN, GCIH, CySA+, and  Pentest+ certifications, and writes books on information security and cyberwarfare, including CompTIA CySA+ Study Guide: Exam CS0-001, CompTIA PenTest+ Study Guide: Exam PT0-001, CISSP Official (ISC)2 Practice Tests, and CompTIA CySA+ Practice Tests: Exam CS0-001, all from Wiley, and Cyberwarfare: Information Operations in a Connected World from Jones and Bartlett. David holds a bachelor’s degree in communication technology and a master’s degree in information security from Eastern Michigan University.  

Title:

"Cloud Strategies and Cloud Moves: What Matters"

Abstract:

Cloud strategies are on everyone's mind, but what makes a cloud move successful? In this interactive conversation, you will learn three major rules to keep in mind for your cloud migration, as well as what matters when you're making cloud moves. Along the way David will share stories and take-aways from his hands-on experience moving the University of Notre Dame to the cloud, and how that experience is shaping what Miami University of Ohio's strategy is. Join us to learn about the habits, processes, and strategic decisions that can make or break your organization's cloud move.

 


 

Breakout Session Speakers

 


Brady Ballstadt

Panelist: Brady Ballstadt
Wireless Solutions Specialist
University of Arkansas, Fayetteville
Session Topic: "Panel: Mission Accomplished"  (Technology Track, 11:15 AM, Chicot)

 


Birajan Bista

Panelist: Birajan Bista
Enterprise Network Engineer
University of Arkansas, Fayetteville
Session Topic: "Panel: Mission Accomplished"  (Technology Track, 11:15 AM, Chicot)

 


Brandon Bitner

Panelist: Brandon Bitner
Campus Network Engineer
University of Arkansas, Fayetteville
Session Topic: "Panel: Mission Accomplished"  (Technology Track, 11:15 AM, Chicot)

 


Ram Cholan

Speaker: Ram Cholan
Solutions Engineer
Akamai Technologies
Title: "Zero Trust Security - Implementing a Zero Trust Architecture for Your Institution"  (Cybersecurity Track, 2:00 PM, Grampas)Download PDF Icon 6
Abstract: Digital transformation at organizations has significant implications on the enterprise attack surface and network and security architectures. Legacy, perimeter-centric models of information security are of no use in today’s digital businesses, as they are no longer bounded by the four walls of their organization. Applications, users, and devices are moving outside, dissolving what was once the trusted enterprise perimeter. The traditional “Trust but verify” approach is no longer an option, as targeted, advanced threats are moving inside the corporate perimeter. Protection is now needed where applications and data, and users and devices are.

This presentation will outline what constitutes Zero Trust, provide guidance on how to implement it, and summarize the key business benefits. Zero Trust is an architectural model for how security teams should redesign networks into secure micro-perimeters, increase data security through obfuscation techniques, limit the risks associated with excessive user privileges, and dramatically improve security detection and response through analytics and automation. It follows a “verify and never trust” approach that is data and identity-centric.

  


Bobby Clark

Speaker: Bobby Clark
Senior Network Engineer
Arkansas Research and Education Optical Network
Title: "Mini-Workshop: Building a FIONA Data Transfer Node for Your Science DMZ"  (Research & Innovation Track, 3:15 PM, Neosho)  -  SESSION CANCELLED
Abstract: This will be a short workshop with an introduction to and demonstration on the steps for building a FIONA Data Transfer Node.  FIONA nodes are specifically designed to facilitate high-volume data transfers that are commonly required in scientific research.  The computer resources that FIONA requires are quite modest (some people have even built them on a Raspberry PI), so anyone can afford to build one.  Among the ways that FIONA nodes can be used is to transfer data from the Science DMZ at your institution to the Science DMZ at another institution where it can be processed by an HPC cluster or visualization system, or to be archived or backed up in a storage pool, or simply to provide data to another researcher for his or her study.  If you are or have a researcher engaged in or planning to engage in the transfer of large data sets, and you want to learn more about FIONA DTNs, this will be a great introduction to how to build your own system.

 


Stephen Cochran

Speaker: Stephen Cochran
Chief Information Security Officer
University of Arkansas for Medical Sciences
Title: "CISO Roundtable"  (Cybersecurity Track, 3:15 PM, Grampas)
Abstract: The moderators of the CISO Roundtable invite security professionals, especially those in management positions, to attend this breakout session to discuss a series of topics on current events, current interest, security operations, security policies, services, threats and response, incident handling, and other areas in the cybersecurity realm. 

 


Bob Collins

Speaker: Bob Collins
Sr. Sales Engineer
Western Digital
Title: "How Scalar Performance-based Storage Technology is Meeting Critical Big and Fast Data Research Demands"  (Technology Track, 10:00 AM, Chicot)
Abstract: Learn how NAND Memory Flash and the newest NVMe technology along with Object Storage systems can radically transform Big Data/Fast Data environments.  Big Data/Fast Data environments often need super low latency high performance compute capabilities while also seamlessly growing to 10s+ of Petabytes (PBs) of size.   Learn how you can build an on premise “Research Cloud” supplemented by high speed critical computing Flash systems - all built at tremendously lower costs than previously known.  Meet the future of research demands now.

 


Michael Davis

Panelist: Michael Davis
Network Engineer
University of Arkansas, Fayetteville
Session Topic: "Panel: Mission Accomplished"  (Technology Track, 11:15 AM, Chicot)

 


James Deaton

Speaker: James Deaton
Executive Director
Great Plains Network
Title: "Efforts in Developing the Emerging National Research Platform"  (Research & Innovation Track, 10:00 AM, Neosho)
Abstract" Inspired by the Pacific Research Platform (https://prp.ucsd.edu/), the idea of a National Research Platform has been the focus of multiple national and regional workshops. This session will provide background on the state and goals of the various research platform initiatives as well as an overview of the the NSF funded activities that are providing cyberinfrastructure (CI) support. We’ll also review the ongoing development of the Great Plains Network Research Platform and how it is building a community of support and new CI capabilities within the region. 

 


Steven Fulkerson

Speaker: Steven Fulkerson
Chief Information Officer
University of Arkansas System
Title: "CIO Roundtable"  (Management Track, 3:15 PM, Riverview)
Abstract: The moderator of the CIO Roundtable invites anyone with the title or responsibility of Chief Information Officer, IT Director, Vice President or Vice Chancellor of IT, to attend this breakout session to discuss a series of topics relevant to information technology as used in the higher education community, including short and long range planning, policy, operations, networking, cloud services, disaster recovery and business continuity, security, and other topics of interest to the group.  The outcome of this roundtable may be a continued group with calls or meetings to discuss topics throughout the year.

 


Alan Greenberg 

Speaker: Alan Greenberg
Chief Information Security Officer
University of Arkansas, Fayetteville
Title: "SOC Operations With Students"  (Cybersecurity Track, 11:15 AM, Grampas)Download PPT Icon 35
Abstract: The University of Arkansas has formed a security operations center using students as the Tier 1 Security support team. The students are recruited, trained, receive certifications in technology operations, and then get hands-on experience. The SOC provides benefits to the University and our students.

Students get unique hands-on security experience. The University gets “more eyes on the network.”  It is a very affordable solution, helps in student retention, and, finally, develops greater cyber security talent for the state.
Title: "CISO Roundtable"  (Cybersecurity Track, 3:15 PM, Grampas)
Abstract: The moderators of the CISO Roundtable invite security professionals, especially those in management positions, to attend this breakout session to discuss a series of topics on current events, current interest, security operations, security policies, services, threats and response, incident handling, and other areas in the cybersecurity realm.  

 


Branden Henner

Speaker: Branden Henner
Systems Engineer
Extreme Networks - AR/OK
Title: "How to Plan for WiFi 6; Theory and Design"  (Technology Track, 3:15 PM, Chicot)
Abstract: The WiFi 6 (802.11AX) standard introduces new technologies to offer up to 4 times the capacity of WiFi 5 (802.11AC). It adapts proven technology from 4G LTE networks that is expected to deliver unprecedented capacity and efficiency to Wi-Fi. The combination of these technologies supports more devices simultaneously; extracting every megabit per second possible. Of course, it’s early in this technology cycle, but this is a great time to learn more about what is coming.

 


JJ Jamison

Speaker: JJ Jamison
Research & Education Networks CTO
Juniper Networks
Title: "Simplifying Security in the Science DMZ"  (Research & Innovation Track, 2:00 PM, Neosho)
Abstract: The Science DMZ is designed to handle high volume data transfers, typical with scientific and high-performance computing, by creating a special DMZ to accommodate those transfers. It is deployed at or near the local network perimeter and is optimized for a moderate number of high-speed flows, rather than for general-purpose business systems or enterprise computing. The Science DMZ architecture was developed in part to work around the fact that conventional firewalls were not capable of supporting single data transfer flows greater than 10 Gbps. Now that 100G capable firewalls are becoming available network engineers are considering how these firewalls can contribute to the security of their Science DMZs. This presentation will include an overview of Science DMZ architectures and the tradeoffs between security and performance. The experiences of government and academic researchers at NASA Goddard and the San Diego Supercomputer Center deploying next-generation firewalls in the network path of HPC Data Flows will be covered including demonstrations by academic researchers on the Pacific Research Platform and at recent Supercomputing Conferences: SC 17 & SC 18. The results of validation testing by ESnet engineers will also be discussed.
Speaker Bio: JJ Jamison is the Chief Technology Officer for Research & Education Markets at Juniper Networks. He has been working in the area of research networking for over 25 years in various roles for: network equipment manufacturers (Juniper and Cisco), academia (University of Illinois); a Federally-funded Research & Development center (MITRE); and a carrier (MCI/Verizon).  JJ has been involved in major network research efforts, including: DoD DISA funded Internet traffic measurement projects; the National Science Foundation’s vBNS NREN; the StarLight global NREN exchange point; and various collaborative research projects among network equipment manufacturers and universities, labs, and research networks in the U.S. and around the world.

 


Jon Kelley

Speaker: Jon Kelley
Divisional Engineering Lead
Next Step Innovation
Title: "When Private Cloud is the Right Cloud"  (Technology Track, 2:00 PM, Chicot)
Abstract: There is a lot of discussion around All-In Public Cloud and Public First Hybrid Multi-Cloud. But what if you need to keep some of your workloads on premises or colocated for data locality, research, or security reasons? A well connected Private Cloud solution may be the answer. However, simply calling on-premises infrastructure a Private Cloud doesn’t make it so. In this talk, Next Step Innovation will outline some real world strategies for modernizing the data center around automation including hardware, software, and networking leading to a self service model and a path to the hybrid cloud future. 

 


Max Kolstad

Speaker: Max Kolstad
Strategic Sales Engineer
Windstream
Title: "To Outsource or Not To Outsource – That is The Question"  (Management Track, 11:15 AM, Riverview) Download PDF Icon 3
Abstract: Many organizations find themselves reviewing their internal IT resources and are discussing shifting away from day-to-day maintenance, or “keeping the lights on,” and they’re looking for partners that can provide managed solutions.  In this discussion there is an evaluation process of the pros and cons of outsourcing services such at enterprise VoIP, Cloud Storage solutions, WAN Management, Managed Network Security, etc.  Discussions should include subjects such as organizational flexibility, employee certification requirements, training, labor costs, oversight, communication and quality.

 


Lonnie Leger

Speaker: Lonnie Leger
Executive Director
Louisiana Optical Network Infrastructure (LONI)
Title: "Louisiana: A Model for Research through Cyberinfrastructure"  (Research & Innovation Track, 11:15 AM, Neosho)
Abstract: Louisiana researchers and universities are leading a concentrated, collaborative effort to advance statewide research through LONI’s cyberinfrastructure: computing systems, data storage systems, and people especially people who all are linked together by a shared vision and the underlying technologies that support that vision.  This vision is to establish interlinked projects whether from a single research, single college, single university, or multiple institution in scope with making a significant difference to the state by creating an environment that encourages increased collaboration leading to new domain and applied research.

 


Bryan McBride

Speaker: Bryan McBride
Systems Engineer
Pure Storage
Title: "Business Continuity in a Hybrid Cloud"  (Management Track, 10:00 AM, Riverview)
Abstract: Pure Storage unifies cloud and makes hybrid easy, enabling business to design applications that take advantage of the agility and innovation of multiple clouds at the same time. Cloud storage solutions from Pure help you build your cloud, run your apps anywhere, and protect your data everywhere. Flexibly choose the best strategy to protect your data. Leverage hybrid capabilities across on-premises, hosted, and public clouds to optimize backup, recovery, and retention with Pure Storage technologies.

 


Devyn Moore

Speaker: Devyn Moore
Network Enterprise Systems Team Lead
University of Arkansas, Fayetteville
Panelists: Michael Davis, Birajan Bista, Brady Ballstadt, Devyn Moore, Brandon Bitner, Bryan Smith-Gibson
Title: "Panel: Mission Accomplished"  (Technology Track, 11:15 AM, Chicot)
Abstract: The University of Arkansas' data network has seen several facelifts over the years, but none as dramatic the one in the Fall of 2018. A campus-wide refresh was an opportunity to re-architect our switching and routing for Wi-Fi, security cameras, IOT, and research with the goal of building a more resilient, responsive, and functional network.

During the fall semester of 2018, with nearly 120,000 weekly clients on the wired or wireless networks spanning nearly 160 campus or remote buildings, U of A network engineers working with a close strategic partner replaced nearly 1,200 switches and 7,500 access points across campus. Listen to the journey that the team made from proof of concept to project closeout, including decisions that had to be made, challenges that had to be overcome and the lessons learned of rebuilding the campus's entire access layer network from the ground up.

 


Bryan Smith-Gibson

Panelist: Bryan Smith-Gibson
Campus Network Analyst
University of Arkansas, Fayetteville
Session Topic: "Panel: Mission Accomplished"  (Technology Track, 11:15 AM, Chicot)

 


Elon Turner

Speaker: Elon Turner
Director of Infrastructure Systems
Network-Data Center-Telecommunications
University of Arkansas, Fayetteville
Title: "Modernize Your Entire Network and Phone System in a Year: Some Prep Required"  (Management Track, 2:00 PM, Riverview)Download PDF Icon 4
Abstract: In 2016, the University of Arkansas was facing a mountain of deferred maintenance on multiple technology fronts. The phone service was now more than 15 years old with network equipment almost as old in some places. No funding was in place for addressing either challenge in any impactful way, as the costs were staggering. How were we going to update a network with 1,200 network switches, 5,000 Wi-Fi access points, and 7,000 phones?

We began an effort to radically change a funding model for voice and networking that had been in place for 20 years. The massive growth of the campus and now reliance on the network as a utility made an old model of looking at the network as a privilege was as obsolete as the equipment on the campus. Flash forward to 2019, and we’re now replacing the campus network and voice system with modern Wi-Fi and Voice-over-IP phones, all within 12 months. I’ll walk through the project through inception, funding, planning, and execution.

 


Christopher Wright

Speaker: Christopher Wright, CISSP, CEH
Citadel Systems, LLC
Title: "Vulnerability Assessment vs. Pentest: What’s the Difference?"  (Cybersecurity Track, 10:00 AM, Grampas)Download PDF Icon 7
Abstract: In security testing, many terms are thrown around without regard for their true meaning. These terms and concepts can be related, but still very different. Each concept has a specific role in an organization’s information security program. When the terms are used incorrectly and the concepts aren’t understood, your organizational security posture can be degraded. In this talk, you will learn the broader meaning of these terms and how they are best used to improve your information security.
Speaker Bio: Chris is a native of Central Arkansas and a graduate of the University of Arkansas. He holds degrees in Computer Engineering and Management Information Systems as well as CISSP and CEH certifications. He is a 12 year veteran of the US Air Force and has also worked for The MITRE Corporation and FIS. Currently, Chris operates a consulting firm focused on making cybersecurity reasonable and affordable for small businesses in the region.