Skip to main content

HSTI Main Conference Sessions

 Shall We Play a Game?

Shall We Play a Game?

Posted Date: 03/11/2024

While I teach high school, any of these activities can be altered to use with your students. Sometimes no skill level is necessary; students are learning something. Sometimes knowledge of material is . . .

Read Full Article


What is Proxmox?

What is Proxmox?

Posted Date: 03/11/2024

Advantages of Proxmox for use as a hypervisor platform. What does it offer that others don't, and the cost advantages of using Proxmox. . . .

Read Full Article


AI-Powered Pedagogy: Exploring Tools, Ethics, and Detection Strategies

AI-Powered Pedagogy: Exploring Tools, Ethics, and Detection Strategies

Posted Date: 03/22/2024

This session will provide an overview of AI-driven tools, ethical considerations, and strategies for responsible implementation in the classroom. Discover how AI can personalize learning, provide targ . . .

Read Full Article


Empowering K-12 Education Through Innovative Collaborations at UA Little Rock

Empowering K-12 Education Through Innovative Collaborations at UA Little Rock

Posted Date: 03/22/2024

In this session, we will explore the various initiatives and programs that showcase UA Little Rock's dedication to enhancing K-12 education. From engaging students in VEX Robotics competitions, hostin . . .

Read Full Article


QR Code Mental Health and Safety System

QR Code Mental Health and Safety System

Posted Date: 03/22/2024

Explore a groundbreaking initiative aimed at fostering student well-being through an innovative, cost-free QR code system or NFC system. This presentation delves into the creation and implementation o . . .

Read Full Article


 One Click Animations: Bring Your Students Projects to Life with Animations

One Click Animations: Bring Your Students Projects to Life with Animations

Posted Date: 03/22/2024

Tell your stories using Animate from Audio in Adobe Express! Have fun creating animated character from your own voice recording Animating has never been easier! . . .

Read Full Article


Get to Know Express: A Deep Dive Into Our All-In-One-Editor

Get to Know Express: A Deep Dive Into Our All-In-One-Editor

Posted Date: 03/22/2024

Learn how our new all-in-one multimedia editor transforms the learning and creating process. In this session you will learn how to take a static graphic and transform it into a powerful multimedia pro . . .

Read Full Article


Streamlined Access to Support: How Implementing a Unified Support Solution Can Reduce Stress

Streamlined Access to Support: How Implementing a Unified Support Solution Can Reduce Stress

Posted Date: 03/22/2024

The impact of classroom disruptions and inefficient workflows have taken a toll on teachers and students in the past few years. From teacher burnout to lower student achievement, K-12 districts across . . .

Read Full Article


School and Classroom Technology-Post ESSER Funds

School and Classroom Technology-Post ESSER Funds

Posted Date: 03/22/2024

This session will focus on technology for schools aiding teachers and administrators for future development of students. . . .

Read Full Article


IKNS and Extreme - Network Security in the Year ‎2024

IKNS and Extreme - Network Security in the Year ‎2024

Posted Date: 03/22/2024

Will discuss best practices and current trends in network security, including authentication, encryption, 802.1x, NAC, device profiling, and more, and provide simpler ways to identify who and what is . . .

Read Full Article


Intro to OSINT (Unveiling the Power of Opensource Intelligence)

Intro to OSINT (Unveiling the Power of Opensource Intelligence)

Posted Date: 05/08/2024

Embark on an hour-long interactive OSINT journey where participants uncover threat actors' information-gathering tactics. The session combines brief insights with hands-on exercises, challenging atten . . .

Read Full Article


Social Engineering

Social Engineering

Posted Date: 05/08/2024

Join me for an interactive hour-long workshop where participants will learn tactics used by social engineers through a presentation followed by group analysis of written and video examples. Gain insig . . .

Read Full Article


Backup Strategies + Commvault

Backup Strategies + Commvault

Posted Date: 05/08/2024

Overview: Backups are a necessity when implementing cybersecurity best practices. This breakout will include an open discussion about backup implementations as well as a summary of DIS’s Commvault bac . . .

Read Full Article


Asset Inventory Discussion/Interaction (Site Notebook)

Asset Inventory Discussion/Interaction (Site Notebook)

Posted Date: 05/08/2024

The purpose of this breakout is to have an open discussion about the importance of documenting all aspects of your network for quick cybersecurity incident recovery as well as disaster recovery. . . .

Read Full Article


Umbrella Reporting/New Features

Umbrella Reporting/New Features

Posted Date: 05/08/2024

There are new features coming down the Cisco Umbrella pipeline. This breakout will focus on the implementation of these new features such as retirement of old clients as well as the deployment of new. . . .

Read Full Article


Device Hardening with LAPS

Device Hardening with LAPS

Posted Date: 05/08/2024

In this session, we’ll delve into the powerful capabilities of Windows Local Administrator Password Solution (LAPS) and explore how it can enhance security within your organization. LAPS is a Windows . . .

Read Full Article


Device Hardening with Windows Firewall

Device Hardening with Windows Firewall

Posted Date: 05/08/2024

In this session, we’ll explore best practices for configuring and managing Windows Firewalls on both servers and desktops using Group Policy. Effective firewall management is crucial for safeguarding . . .

Read Full Article


 Log Collection with Graylog

Log Collection with Graylog

Posted Date: 05/08/2024

In this session, we’ll explore how Graylog, a powerful log management platform, can significantly improve your organization’s security posture. Specifically, we’ll focus on two critical aspects: event . . .

Read Full Article


Email security - SPF,DKIM,DMARC

Email security - SPF,DKIM,DMARC

Posted Date: 05/08/2024

In this session, we’ll dive into the essential components of email security: SPF (Sender Policy Framework), DMARC (Domain-based Message Authentication, Reporting, and Conformance), and DKIM (DomainKey . . .

Read Full Article


Solarwinds

Solarwinds

Posted Date: 05/08/2024

How to use Solarwinds to monitor your Internet Bandwidth Utilization and health of state network devices that you are connected to. . . .

Read Full Article


 Leg. Audit Nessus Scan Results

Leg. Audit Nessus Scan Results

Posted Date: 05/08/2024

Need help deciphering the results from your legislative audit? Come by and let us look together to figure them out. . . .

Read Full Article


Tracking Down Loops

Tracking Down Loops

Posted Date: 05/08/2024

How to identify and find undesired conditions in computer network traffic where data packets circulate endlessly within a network due to redundant connections between devices, potentially leading to c . . .

Read Full Article


Strengthening Network Security with Endpoint Detection and Response (EDR)

Strengthening Network Security with Endpoint Detection and Response (EDR)

Posted Date: 05/08/2024

In today’s rapidly evolving threat landscape, organizations face persistent cyber risks that can compromise their endpoints—devices like laptops, desktops, and mobile phones. Endpoint Detection and Re . . .

Read Full Article


DIS Q&A  

DIS Q&A  

Posted Date: 05/08/2024

This session will be a round table discussion with your DIS APSCN LAN Crew. We will answer any questions and address any concerns you might have. . . .

Read Full Article


What to Consider When Implementing a New Communications Tool

What to Consider When Implementing a New Communications Tool

Posted Date: 03/26/2024

This session will focus on the adoption of a new communications platform. Adopting a new communications platform in your district can be daunting – what do you need to do to prepare? How can you ensur . . .

Read Full Article