Posted Date: 03/11/2024
While I teach high school, any of these activities can be altered to use with your students. Sometimes no skill level is necessary; students are learning something. Sometimes knowledge of material is . . .
Posted Date: 03/11/2024
Advantages of Proxmox for use as a hypervisor platform. What does it offer that others don't, and the cost advantages of using Proxmox. . . .
Posted Date: 03/22/2024
This session will provide an overview of AI-driven tools, ethical considerations, and strategies for responsible implementation in the classroom. Discover how AI can personalize learning, provide targ . . .
Posted Date: 03/22/2024
In this session, we will explore the various initiatives and programs that showcase UA Little Rock's dedication to enhancing K-12 education. From engaging students in VEX Robotics competitions, hostin . . .
Posted Date: 03/22/2024
Explore a groundbreaking initiative aimed at fostering student well-being through an innovative, cost-free QR code system or NFC system. This presentation delves into the creation and implementation o . . .
Posted Date: 03/22/2024
Tell your stories using Animate from Audio in Adobe Express! Have fun creating animated character from your own voice recording Animating has never been easier! . . .
Posted Date: 03/22/2024
Learn how our new all-in-one multimedia editor transforms the learning and creating process. In this session you will learn how to take a static graphic and transform it into a powerful multimedia pro . . .
Posted Date: 03/22/2024
The impact of classroom disruptions and inefficient workflows have taken a toll on teachers and students in the past few years. From teacher burnout to lower student achievement, K-12 districts across . . .
Posted Date: 03/22/2024
This session will focus on technology for schools aiding teachers and administrators for future development of students. . . .
Posted Date: 03/22/2024
Will discuss best practices and current trends in network security, including authentication, encryption, 802.1x, NAC, device profiling, and more, and provide simpler ways to identify who and what is . . .
Posted Date: 05/08/2024
Embark on an hour-long interactive OSINT journey where participants uncover threat actors' information-gathering tactics. The session combines brief insights with hands-on exercises, challenging atten . . .
Posted Date: 05/08/2024
Join me for an interactive hour-long workshop where participants will learn tactics used by social engineers through a presentation followed by group analysis of written and video examples. Gain insig . . .
Posted Date: 05/08/2024
Overview: Backups are a necessity when implementing cybersecurity best practices. This breakout will include an open discussion about backup implementations as well as a summary of DIS’s Commvault bac . . .
Posted Date: 05/08/2024
The purpose of this breakout is to have an open discussion about the importance of documenting all aspects of your network for quick cybersecurity incident recovery as well as disaster recovery. . . .
Posted Date: 05/08/2024
There are new features coming down the Cisco Umbrella pipeline. This breakout will focus on the implementation of these new features such as retirement of old clients as well as the deployment of new. . . .
Posted Date: 05/08/2024
In this session, we’ll delve into the powerful capabilities of Windows Local Administrator Password Solution (LAPS) and explore how it can enhance security within your organization. LAPS is a Windows . . .
Posted Date: 05/08/2024
In this session, we’ll explore best practices for configuring and managing Windows Firewalls on both servers and desktops using Group Policy. Effective firewall management is crucial for safeguarding . . .
Posted Date: 05/08/2024
In this session, we’ll explore how Graylog, a powerful log management platform, can significantly improve your organization’s security posture. Specifically, we’ll focus on two critical aspects: event . . .
Posted Date: 05/08/2024
In this session, we’ll dive into the essential components of email security: SPF (Sender Policy Framework), DMARC (Domain-based Message Authentication, Reporting, and Conformance), and DKIM (DomainKey . . .
Posted Date: 05/08/2024
How to use Solarwinds to monitor your Internet Bandwidth Utilization and health of state network devices that you are connected to. . . .
Posted Date: 05/08/2024
Need help deciphering the results from your legislative audit? Come by and let us look together to figure them out. . . .
Posted Date: 05/08/2024
How to identify and find undesired conditions in computer network traffic where data packets circulate endlessly within a network due to redundant connections between devices, potentially leading to c . . .
Posted Date: 05/08/2024
In today’s rapidly evolving threat landscape, organizations face persistent cyber risks that can compromise their endpoints—devices like laptops, desktops, and mobile phones. Endpoint Detection and Re . . .
Posted Date: 05/08/2024
This session will be a round table discussion with your DIS APSCN LAN Crew. We will answer any questions and address any concerns you might have. . . .
Posted Date: 03/26/2024
This session will focus on the adoption of a new communications platform. Adopting a new communications platform in your district can be daunting – what do you need to do to prepare? How can you ensur . . .