<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://uctech2025.ucr.edu/">
  <channel>
    <title>Security, Compliance, &amp;amp; Privacy</title>
    <link>https://uctech2025.ucr.edu/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Optimize your SecOps Application Security using SmartSheets  </title>
  <link>https://uctech2025.ucr.edu/sessions/optimize-your-secops-application-security-using-smartsheets-0</link>
  <description>&lt;span&gt;Optimize your SecOps Application Security using SmartSheets  &lt;/span&gt;
&lt;span&gt;&lt;span&gt;kaylal&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;&lt;time datetime="2025-05-19T23:11:53-07:00" title="Monday, May 19, 2025 - 23:11"&gt;Mon, 05/19/2025 - 23:11&lt;/time&gt;
&lt;/span&gt;
&lt;form class="content-moderation-entity-moderation-form" data-drupal-selector="content-moderation-entity-moderation-form" action="https://uctech2025.ucr.edu/taxonomy/term/43/feed" method="post" id="content-moderation-entity-moderation-form" accept-charset="UTF-8"&gt;
  &lt;input autocomplete="off" data-drupal-selector="form-csnyum5u0yt84bxwfj7dljpntuvguv4cci79u-kuve8" type="hidden" name="form_build_id" value="form-CsNyuM5u0yt84BXwFj7dljpnTuVguv4CcI79u-KUVE8"&gt;
&lt;input data-drupal-selector="edit-content-moderation-entity-moderation-form" type="hidden" name="form_id" value="content_moderation_entity_moderation_form"&gt;

&lt;/form&gt;
&lt;drupal-render-placeholder callback="flag.link_builder:build" arguments="0=node&amp;amp;1=232&amp;amp;2=follow_session" token="9UoKWVypHQlU6tnpADMISmUolZxAFsngx6gGCnjHzQA"&gt;&lt;/drupal-render-placeholder&gt;
            Join us as we showcase our solution for creating a user-friendly interface to track operational tasks. The Campus Application and Data Security team is dedicated to providing services that ensure consistency, data integrity, and compliance with our Service Level Agreements. To achieve this, we have utilized Smartsheets to inventory all tasks in a centralized location. This approach enables us to generate metrics and monitor resource capacity. Visual dashboards of our ongoing work tell our story across the organization.

In the Beginning: Inventory of all tasks, including organizational assets, mandatory actions, protection levels, system availability, and much more.

Who's Who: Identify key contributors, needed skill sets and create a RACI.

Soup to Nuts: Transform raw data into a visual dashboard, emphasizing key metrics and telling your story!

Living the Dream: Take Security Operations to the next level by Operationalizing your tasks effectively. You've built it, now what?
    
    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Primary/Host Speaker&lt;/div&gt;
                                    
&lt;div class="cell uctech-speaker-details"&gt;
     &lt;div&gt;
  
  
              &lt;img loading="lazy" src="https://uctech2025.ucr.edu/sites/default/files/styles/medium/public/screenshot_2025-06-05_at_3.58.59_pm.png?itok=vtdWl_om" width="148" height="220" alt="Katie Yip"&gt;


    
&lt;/div&gt;
 &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Katie Yip&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;IT Security Analyst&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC Berkeley &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt; &lt;/p&gt;&lt;p&gt;Katie Yip is an IT Security Analyst at UC Berkeley, where she manages access provisioning, process automation, and data security across enterprise systems like PeopleSoft, Jira, and ServiceNow. With a background in Electrical Engineering and Computer Science, she blends technical problem-solving with cross-functional collaboration to support campus-wide initiatives. Katie is passionate about building secure, user-friendly systems and enjoys exploring creative intersections between technology, storytelling, and community impact.&lt;/p&gt; 
&lt;/div&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Format&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session-format/poster" hreflang="en"&gt;Poster&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Skill Level&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session/skill-level/beginner" hreflang="en"&gt;Beginner&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Status&lt;/div&gt;
                                    Accepted                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/program-tracks/security-compliance-privacy" hreflang="en"&gt;Security, Compliance, &amp;amp; Privacy&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track Reasoning&lt;/div&gt;
                                    I am presenting in this track because our solution directly addresses the critical aspects of security, compliance, and privacy within our organization. The Campus Application and Data Security team is responsible for ensuring consistency, data integrity, and compliance with our Service Level Agreements. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Date &amp;amp; Time&lt;/div&gt;
                                    &lt;time datetime="2025-06-27T17:45:00Z"&gt;June 27, 2025 @ 10:45 am&lt;/time&gt;
 - &lt;time datetime="2025-06-27T18:30:00Z"&gt;June 27, 2025 @ 11:30 am&lt;/time&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Room&lt;/div&gt;
                                    EH C                        &lt;/div&gt;
</description>
  <pubDate>Tue, 20 May 2025 06:11:53 +0000</pubDate>
    <dc:creator>kaylal</dc:creator>
    <guid isPermaLink="false">232 at https://uctech2025.ucr.edu</guid>
    </item>
<item>
  <title>Optimize your SecOps Application Security using SmartSheets  </title>
  <link>https://uctech2025.ucr.edu/sessions/optimize-your-secops-application-security-using-smartsheets</link>
  <description>&lt;span&gt;Optimize your SecOps Application Security using SmartSheets  &lt;/span&gt;
&lt;span&gt;&lt;span&gt;Anonymous (not verified)&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;&lt;time datetime="2025-03-27T15:50:27-07:00" title="Thursday, March 27, 2025 - 15:50"&gt;Thu, 03/27/2025 - 15:50&lt;/time&gt;
&lt;/span&gt;
&lt;form class="content-moderation-entity-moderation-form" data-drupal-selector="content-moderation-entity-moderation-form-2" action="https://uctech2025.ucr.edu/taxonomy/term/43/feed" method="post" id="content-moderation-entity-moderation-form--2" accept-charset="UTF-8"&gt;
  &lt;input autocomplete="off" data-drupal-selector="form-rh-jgpm2xvmvonmzcbydelrtudaftib-ihudddyereo" type="hidden" name="form_build_id" value="form-rh_jgpM2XvMVONmzCBYDELrtUDaFTiB_ihUDdDYEREo"&gt;
&lt;input data-drupal-selector="edit-content-moderation-entity-moderation-form-2" type="hidden" name="form_id" value="content_moderation_entity_moderation_form"&gt;

&lt;/form&gt;
&lt;drupal-render-placeholder callback="flag.link_builder:build" arguments="0=node&amp;amp;1=186&amp;amp;2=follow_session" token="5dFik9Kk5B6Y8U70dbnYqSHGhZi6viXbtMqs8eqAdPQ"&gt;&lt;/drupal-render-placeholder&gt;
            Join us as we showcase our solution for creating a user-friendly interface to track operational tasks. The Campus Application and Data Security team is dedicated to providing services that ensure consistency, data integrity, and compliance with our Service Level Agreements. To achieve this, we have utilized Smartsheets to inventory all tasks in a centralized location. This approach enables us to generate metrics and monitor resource capacity. Visual dashboards of our ongoing work tell our story across the organization.

In the Beginning: Inventory of all tasks, including organizational assets, mandatory actions, protection levels, system availability, and much more.

Who's Who: Identify key contributors, needed skill sets and create a RACI.

Soup to Nuts: Transform raw data into a visual dashboard, emphasizing key metrics and telling your story!

Living the Dream: Take Security Operations to the next level by Operationalizing your tasks effectively. You've built it, now what?
    
    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Primary/Host Speaker&lt;/div&gt;
                                    
&lt;div class="cell uctech-speaker-details"&gt;
     &lt;div&gt;
  
  
              &lt;img loading="lazy" src="https://uctech2025.ucr.edu/sites/default/files/styles/medium/public/screenshot_2025-06-05_at_3.58.59_pm.png?itok=vtdWl_om" width="148" height="220" alt="Katie Yip"&gt;


    
&lt;/div&gt;
 &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Katie Yip&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;IT Security Analyst&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC Berkeley &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt; &lt;/p&gt;&lt;p&gt;Katie Yip is an IT Security Analyst at UC Berkeley, where she manages access provisioning, process automation, and data security across enterprise systems like PeopleSoft, Jira, and ServiceNow. With a background in Electrical Engineering and Computer Science, she blends technical problem-solving with cross-functional collaboration to support campus-wide initiatives. Katie is passionate about building secure, user-friendly systems and enjoys exploring creative intersections between technology, storytelling, and community impact.&lt;/p&gt; 
&lt;/div&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Format&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session-format/poster" hreflang="en"&gt;Poster&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Skill Level&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session/skill-level/beginner" hreflang="en"&gt;Beginner&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Status&lt;/div&gt;
                                    Accepted                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/program-tracks/security-compliance-privacy" hreflang="en"&gt;Security, Compliance, &amp;amp; Privacy&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track Reasoning&lt;/div&gt;
                                    I am presenting in this track because our solution directly addresses the critical aspects of security, compliance, and privacy within our organization. The Campus Application and Data Security team is responsible for ensuring consistency, data integrity, and compliance with our Service Level Agreements. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Date &amp;amp; Time&lt;/div&gt;
                                    &lt;time datetime="2025-06-26T20:00:00Z"&gt;June 26, 2025 @ 1:00 pm&lt;/time&gt;
 - &lt;time datetime="2025-06-26T20:45:00Z"&gt;June 26, 2025 @ 1:45 pm&lt;/time&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Room&lt;/div&gt;
                                    EH C                        &lt;/div&gt;
</description>
  <pubDate>Thu, 27 Mar 2025 22:50:27 +0000</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <guid isPermaLink="false">186 at https://uctech2025.ucr.edu</guid>
    </item>
<item>
  <title>AI Feature Creep: Enhancing Institutional Control in Vendor Management</title>
  <link>https://uctech2025.ucr.edu/sessions/ai-feature-creep-enhancing-institutional-control-vendor-management</link>
  <description>&lt;span&gt;AI Feature Creep: Enhancing Institutional Control in Vendor Management&lt;/span&gt;
&lt;span&gt;&lt;span&gt;Anonymous (not verified)&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;&lt;time datetime="2025-03-27T15:20:51-07:00" title="Thursday, March 27, 2025 - 15:20"&gt;Thu, 03/27/2025 - 15:20&lt;/time&gt;
&lt;/span&gt;
&lt;form class="content-moderation-entity-moderation-form" data-drupal-selector="content-moderation-entity-moderation-form-3" action="https://uctech2025.ucr.edu/taxonomy/term/43/feed" method="post" id="content-moderation-entity-moderation-form--3" accept-charset="UTF-8"&gt;
  &lt;input autocomplete="off" data-drupal-selector="form-v8u58bkrmzfkuncvoqroouwxltl6z-kb-jvzyghvhk8" type="hidden" name="form_build_id" value="form-v8U58BKrmzfKUNCVOQrOoUWxLtL6z_Kb_jvZYGhvhk8"&gt;
&lt;input data-drupal-selector="edit-content-moderation-entity-moderation-form-3" type="hidden" name="form_id" value="content_moderation_entity_moderation_form"&gt;

&lt;/form&gt;
&lt;drupal-render-placeholder callback="flag.link_builder:build" arguments="0=node&amp;amp;1=184&amp;amp;2=follow_session" token="d8uGXaKXg4xU5JozC2Snr1vAuTzMMdikpaCSiHO6QJk"&gt;&lt;/drupal-render-placeholder&gt;
            As AI vendors rapidly introduce new features without consulting institutions, the risks to security, compliance, and privacy grow significantly. Unapproved AI functionalities can introduce vulnerabilities, increasing the chances of data breaches and unauthorized access. These updates may also violate critical regulations like FERPA and HIPAA, complicating compliance and exposing institutions to legal risks. To mitigate these challenges, institutions must actively manage AI vendor relationships and behaviors, ensuring that vendor innovations align with institutional security, regulatory, and ethical standards. This session will provide strategies for effectively managing vendor behavior, focusing on contract management, proactive policy enforcement, and establishing clear communication channels to prevent AI feature creep. Participants will gain insights into risk assessment and best practices for holding vendors accountable, protecting both privacy and institutional integrity.    
    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Primary/Host Speaker&lt;/div&gt;
                                    
&lt;div class="cell uctech-speaker-details"&gt;
     &lt;div&gt;
  
  
              &lt;img loading="lazy" src="https://uctech2025.ucr.edu/sites/default/files/styles/medium/public/lisha_bornilla_-_photo_1.jpg?itok=FebIPCDJ" width="157" height="220" alt="Lisha Bornilla"&gt;


    
&lt;/div&gt;
 &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Lisha Bornilla&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;Learning Tools Service Lead&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC Berkeley &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt; &lt;/p&gt;&lt;p style="line-height:1.38;margin-bottom:0pt;margin-top:0pt;" dir="ltr"&gt;Lisha Bornilla is the Learning Tools Service Lead at UC Berkeley’s Research, Teaching, and Learning division, where she manages campus-wide instructional technology platforms and their vendor relationships. She specializes in navigating the evolving edtech landscape—especially as AI features are rapidly integrated into existing tools and new products. Lisha advocates for institutional control, accessibility, and ethical implementation of digital tools in higher education. Her cross-functional work bridges pedagogy, policy, and technical infrastructure, ensuring that instructional technology adoption aligns with university values and compliance standards. With a background in learning design and master's degree in education and technology from the Harvard Graduate School of Education, she brings a systems-oriented approach to managing vendor innovation and risk in an age where AI innovation moves faster than policy and vendor roadmaps often outpace institutional readiness and oversight.&lt;/p&gt; 
&lt;/div&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Format&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session-format/standard-presentation" hreflang="en"&gt;Standard Presentation&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Skill Level&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session/skill-level/beginner" hreflang="en"&gt;Beginner&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Status&lt;/div&gt;
                                    Accepted                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/program-tracks/security-compliance-privacy" hreflang="en"&gt;Security, Compliance, &amp;amp; Privacy&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track Reasoning&lt;/div&gt;
                                     As AI vendors rapidly roll out new features without consulting institutions, security, compliance, and privacy risks escalate. Unapproved AI functionalities may introduce vulnerabilities, increasing the risk of data breaches and unauthorized access. Compliance challenges arise when vendors push AI updates that may violate FERPA, HIPAA, or institutional policies. Additionally, AI-driven data processing can compromise student and staff privacy, requiring stronger governance. This session explores strategies to manage AI vendor relationships, ensuring that technological advancements align with institutional security, regulatory, and ethical standards. Participants will gain insights into risk assessment, contract management, and proactive policy enforcement to prevent AI feature creep from undermining institutional integrity.                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Date &amp;amp; Time&lt;/div&gt;
                                    &lt;time datetime="2025-06-26T21:00:00Z"&gt;June 26, 2025 @ 2:00 pm&lt;/time&gt;
 - &lt;time datetime="2025-06-26T21:45:00Z"&gt;June 26, 2025 @ 2:45 pm&lt;/time&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Room&lt;/div&gt;
                                    MR 8                        &lt;/div&gt;
</description>
  <pubDate>Thu, 27 Mar 2025 22:20:51 +0000</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <guid isPermaLink="false">184 at https://uctech2025.ucr.edu</guid>
    </item>
<item>
  <title>Maneuvering Risky Waters - Zoom AI Companion</title>
  <link>https://uctech2025.ucr.edu/sessions/maneuvering-risky-waters-zoom-ai-companion</link>
  <description>&lt;span&gt;Maneuvering Risky Waters - Zoom AI Companion&lt;/span&gt;
&lt;span&gt;&lt;span&gt;Anonymous (not verified)&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;&lt;time datetime="2025-03-27T11:45:31-07:00" title="Thursday, March 27, 2025 - 11:45"&gt;Thu, 03/27/2025 - 11:45&lt;/time&gt;
&lt;/span&gt;
&lt;form class="content-moderation-entity-moderation-form" data-drupal-selector="content-moderation-entity-moderation-form-4" action="https://uctech2025.ucr.edu/taxonomy/term/43/feed" method="post" id="content-moderation-entity-moderation-form--4" accept-charset="UTF-8"&gt;
  &lt;input autocomplete="off" data-drupal-selector="form-cu9g4gcxhrgqn-yebcf7btbeirhbwiobwlyj7kstnrg" type="hidden" name="form_build_id" value="form-Cu9G4gcXhRgQN_Yebcf7bTbEirhBWiObWlYJ7KStnrg"&gt;
&lt;input data-drupal-selector="edit-content-moderation-entity-moderation-form-4" type="hidden" name="form_id" value="content_moderation_entity_moderation_form"&gt;

&lt;/form&gt;
&lt;drupal-render-placeholder callback="flag.link_builder:build" arguments="0=node&amp;amp;1=168&amp;amp;2=follow_session" token="WFyZ_fEQXC3zZKDZQ_6yk53YP36jGhwcuvjTrfzUqrk"&gt;&lt;/drupal-render-placeholder&gt;
            As Generative AI continues to expand into our every day working lives securing our conversations becomes more and more vital. UCSF, long with many other UCs, have recently enabled to Zoom's AI Companion for our meetings. This talk will dive into the security and vetting process to enabling this feature, outline what type of data classification and conversation types are cleared for these type of calls, and explain what per cautions are implace to ensure our data security going forward.     
    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Primary/Host Speaker&lt;/div&gt;
                                    
&lt;div class="cell uctech-speaker-details"&gt;
      &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;John McWalter&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;Senior UC Engineer&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC San Francisco &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt;  &lt;/p&gt;
&lt;/div&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Format&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session-format/standard-presentation" hreflang="en"&gt;Standard Presentation&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Skill Level&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session/skill-level/beginner" hreflang="en"&gt;Beginner&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Status&lt;/div&gt;
                                    Accepted                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/program-tracks/security-compliance-privacy" hreflang="en"&gt;Security, Compliance, &amp;amp; Privacy&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track Reasoning&lt;/div&gt;
                                    I've selected Security, Compliance, &amp;amp; Privacy as the track for this talk. This is right up the alley of Security given how sensitive the topic of AI and recording of conversations are to all of UC.                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Date &amp;amp; Time&lt;/div&gt;
                                    &lt;time datetime="2025-06-26T22:00:00Z"&gt;June 26, 2025 @ 3:00 pm&lt;/time&gt;
 - &lt;time datetime="2025-06-26T22:45:00Z"&gt;June 26, 2025 @ 3:45 pm&lt;/time&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Room&lt;/div&gt;
                                    MR 9                        &lt;/div&gt;
</description>
  <pubDate>Thu, 27 Mar 2025 18:45:31 +0000</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <guid isPermaLink="false">168 at https://uctech2025.ucr.edu</guid>
    </item>
<item>
  <title>Innovate Your Disaster Recovery: A Structured ISO Review of Disaster Recovery Plans Anchored in UC IS-12 Policy</title>
  <link>https://uctech2025.ucr.edu/sessions/innovate-your-disaster-recovery-structured-iso-review-disaster-recovery-plans-anchored-uc</link>
  <description>&lt;span&gt;Innovate Your Disaster Recovery: A Structured ISO Review of Disaster Recovery Plans Anchored in UC IS-12 Policy&lt;/span&gt;
&lt;span&gt;&lt;span&gt;Anonymous (not verified)&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;&lt;time datetime="2025-03-26T18:13:13-07:00" title="Wednesday, March 26, 2025 - 18:13"&gt;Wed, 03/26/2025 - 18:13&lt;/time&gt;
&lt;/span&gt;
&lt;form class="content-moderation-entity-moderation-form" data-drupal-selector="content-moderation-entity-moderation-form-5" action="https://uctech2025.ucr.edu/taxonomy/term/43/feed" method="post" id="content-moderation-entity-moderation-form--5" accept-charset="UTF-8"&gt;
  &lt;input autocomplete="off" data-drupal-selector="form-xdfrvb-x-8ckqteg6irmlobdsat6nqm670x493see14" type="hidden" name="form_build_id" value="form-XdfrVb_x-8CKqTEg6IRMlobDSAT6nqm670X493seE14"&gt;
&lt;input data-drupal-selector="edit-content-moderation-entity-moderation-form-5" type="hidden" name="form_id" value="content_moderation_entity_moderation_form"&gt;

&lt;/form&gt;
&lt;drupal-render-placeholder callback="flag.link_builder:build" arguments="0=node&amp;amp;1=147&amp;amp;2=follow_session" token="7KHVLTEgfGMQrHT1yUByiluCysNl3QpRMWySLfY3i_I"&gt;&lt;/drupal-render-placeholder&gt;
            In an era of operational unpredictability, climate disruptions, and escalating cyber threats, a robust Disaster Recovery Plan (DRP) is not optional, it is existential. This session introduces a structured ISO-style review framework for evaluating DRPs against the University of California's IS-12 policy. Through a practical checklist covering both procedural and technical dimensions, participants will learn to assess alignment with institutional goals, identify gaps, and verify the presence of cybersecurity risk considerations. The approach blends ISO-inspired rigor with UC policy relevance, promoting an integrative, innovative, and inspiring pathway toward IT resilience.
Attendees will leave empowered to launch or improve DRP reviews within their own campus or units using a transferable checklist template that embodies best practices. This session bridges the gap between documentation and action, delivering operational clarity in the face of disruption.    
    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Primary/Host Speaker&lt;/div&gt;
                                    
&lt;div class="cell uctech-speaker-details"&gt;
     &lt;div&gt;
  
  
              &lt;img loading="lazy" src="https://uctech2025.ucr.edu/sites/default/files/styles/medium/public/austine_j_ohwobete.jpg?itok=CwiHRBo-" width="200" height="200" alt="Austine J. Ohwobete"&gt;


    
&lt;/div&gt;
 &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Austine J. Ohwobete&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;Information Security Liaison&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC Davis &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt; &lt;/p&gt;&lt;p&gt;Dr. Austine J. Ohwobete is the ISO Liaison Officer at the University of California, Davis, where he directs structured, policy-aligned reviews of Disaster Recovery Plans under UC IS-12. In this capacity, he has developed and implemented an ISO-inspired framework that rigorously assesses procedural and technical controls, identifies governance and cybersecurity gaps, and ensures institutional resilience. He also serves as the primary liaison between the ISO Office and key campus units, including IET, DEVAR, and the School of Education.&lt;/p&gt;&lt;p&gt;Since 2018, Dr. Ohwobete has served as an adjunct professor at the Forbes School of Business &amp;amp; Technology, University of Arizona, where he designs and delivers graduate-level coursework in cybersecurity, IT management, and data privacy. Previously, he was Virtual Chief Information Security Officer at NetSecurity Corporation, leading cryptographic architecture reviews, vulnerability management, and regulatory compliance initiatives—including ISO 27001, SOC 2, PCI-DSS, HIPAA, and FedRAMP.&lt;/p&gt;&lt;p&gt;He holds a Ph.D. in IT Management (Information Security &amp;amp; Regulatory Compliance), a Master of Legal Studies in Intellectual Property Litigation, and a Master of Dispute Resolution specializing in Cybersecurity Arbitration. A Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), and Certified Information Protection Professional (CIPP/US), Dr. Ohwobete brings more than two decades of expertise in risk management, privacy, and AI-infused security strategy. His international handbook, AI-Infused Cybersecurity Operations: Designing, Implementing, and Evolving Adaptive Security Programs, is slated for publication late this summer.&lt;/p&gt; 
&lt;/div&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Files&lt;/div&gt;
                &lt;div&gt;
                                    &lt;div&gt;&lt;span class="file file--mime-application-vnd-openxmlformats-officedocument-wordprocessingml-document file--x-office-document"&gt;&lt;a href="https://uctech2025.ucr.edu/system/files/webform/session_proposal_form/76/uctech2025_dr_proposal.docx" type="application/vnd.openxmlformats-officedocument.wordprocessingml.document"&gt;uctech2025_dr_proposal.docx&lt;/a&gt;&lt;/span&gt;
  &lt;span&gt;(30.69 KB)&lt;/span&gt;
&lt;/div&gt;                            &lt;/div&gt;
            &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Format&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session-format/standard-presentation" hreflang="en"&gt;Standard Presentation&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Skill Level&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session/skill-level/advanced" hreflang="en"&gt;Advanced&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Status&lt;/div&gt;
                                    Accepted                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/program-tracks/security-compliance-privacy" hreflang="en"&gt;Security, Compliance, &amp;amp; Privacy&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track Reasoning&lt;/div&gt;
                                    This session best fits the Security, Compliance, &amp;amp; Privacy track, as it focuses on reviewing Disaster Recovery Plans through the lens of policy compliance, cybersecurity risk assessment, and operational governance. The checklist methodology is grounded in ISO principles and UC IS-12, aligning directly with institutional requirements and the Security, Compliance, &amp;amp; Privacy track’s focus on structured oversight, strategic alignment, and resilience-building.                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Date &amp;amp; Time&lt;/div&gt;
                                    &lt;time datetime="2025-06-26T17:45:00Z"&gt;June 26, 2025 @ 10:45 am&lt;/time&gt;
 - &lt;time datetime="2025-06-26T18:30:00Z"&gt;June 26, 2025 @ 11:30 am&lt;/time&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Room&lt;/div&gt;
                                    MR 7                        &lt;/div&gt;
</description>
  <pubDate>Thu, 27 Mar 2025 01:13:13 +0000</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <guid isPermaLink="false">147 at https://uctech2025.ucr.edu</guid>
    </item>
<item>
  <title>Students as Cyber Guardians: Pioneering AI Security in Higher Education</title>
  <link>https://uctech2025.ucr.edu/sessions/students-cyber-guardians-pioneering-ai-security-higher-education</link>
  <description>&lt;span&gt;Students as Cyber Guardians: Pioneering AI Security in Higher Education&lt;/span&gt;
&lt;span&gt;&lt;span&gt;Anonymous (not verified)&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;&lt;time datetime="2025-03-26T17:02:13-07:00" title="Wednesday, March 26, 2025 - 17:02"&gt;Wed, 03/26/2025 - 17:02&lt;/time&gt;
&lt;/span&gt;
&lt;form class="content-moderation-entity-moderation-form" data-drupal-selector="content-moderation-entity-moderation-form-6" action="https://uctech2025.ucr.edu/taxonomy/term/43/feed" method="post" id="content-moderation-entity-moderation-form--6" accept-charset="UTF-8"&gt;
  &lt;input autocomplete="off" data-drupal-selector="form-imelesra8jhiki40ujhfn13szk7oibr-drcp29zbtc8" type="hidden" name="form_build_id" value="form-ImElesrA8JHikI40UjHFn13SzK7oiBR-DRCP29ZBTC8"&gt;
&lt;input data-drupal-selector="edit-content-moderation-entity-moderation-form-6" type="hidden" name="form_id" value="content_moderation_entity_moderation_form"&gt;

&lt;/form&gt;
&lt;drupal-render-placeholder callback="flag.link_builder:build" arguments="0=node&amp;amp;1=143&amp;amp;2=follow_session" token="5eHoMk76r6181Wzem4xJ_5Mvq90Uq0box_VvrApsUjY"&gt;&lt;/drupal-render-placeholder&gt;
            Our institution has launched an innovative collaboration between our generative AI solution and a student-led cybersecurity club, setting new standards for AI security testing and student engagement in real-world challenges.

Key aspects:
Unique partnership: Students access pre-release code in staging environments
Comprehensive testing methods: Input boundaries, system prompt extraction, web application security, LLM, jailbreaking
Focus on AI-specific vulnerabilities: Exploring unique risks posed by AI systems
Educational impact: Hands-on experience in penetration testing for students
Real-world application: Balancing learning with actual system testing

The project will be formalized in a penetration test report. 
This is a model for institutions to address emerging technological challenges while providing learning opportunities. It demonstrates how we can proactively secure AI systems while cultivating the next generation of cybersecurity leaders. 
    
    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Primary/Host Speaker&lt;/div&gt;
                                    
&lt;div class="cell uctech-speaker-details"&gt;
     &lt;div&gt;
  
  
              &lt;img loading="lazy" src="https://uctech2025.ucr.edu/sites/default/files/styles/medium/public/chris_price_-_photo.jpg?itok=JdXoUYMv" width="220" height="202" alt="Chris Price"&gt;


    
&lt;/div&gt;
 &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Chris Price&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;AI Lead Software Solutions Architect and Developer&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC Irvine &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt; &lt;/p&gt;&lt;p&gt;AI Lead Software Solutions Architect and Developer for UC Irvine's new Generative AI team under the Office of Information Technology (OIT), primarily supporting the ZotGPT platform and brand. Since the emergence of generative AI, Chris has played a pivotal role architecting generative AI solutions, including UCI's ZotGPT platform, to engage our campus community in this new technology. Chris provides technical direction, solution evaluation, software implementation, project management, and overall connects and coordinates the team of volunteers and full time staff with the goals for the platform. Before this Chris supported UC Irvine's Office of Research Administration for a little over 6 years, and UC Irvine's Student Life and Leadership for a little over 5 years. During that time Chris published software security research in password management. Prior to higher education, Chris worked for themselves in the software development field for about 7 years.&lt;/p&gt; 
&lt;/div&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Additional Speakers&lt;/div&gt;
                &lt;div&gt;
                                    &lt;div&gt;
&lt;div class="cell uctech-speaker-details"&gt;
      &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Jeff Picco&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;Security Engineer&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC Irvine &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt;  &lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;                            &lt;div&gt;
&lt;div class="cell uctech-speaker-details"&gt;
      &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Steven Ngo&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;Software Engineering Ph.D. Student&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC Irvine &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt;  &lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;                            &lt;/div&gt;
            &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Format&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session-format/standard-presentation" hreflang="en"&gt;Standard Presentation&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Skill Level&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session/skill-level/beginner" hreflang="en"&gt;Beginner&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Status&lt;/div&gt;
                                    Accepted                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/program-tracks/security-compliance-privacy" hreflang="en"&gt;Security, Compliance, &amp;amp; Privacy&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track Reasoning&lt;/div&gt;
                                    Real-world application: Students are working on real cutting edge systems, bridging the gap between academic theory and implementation.&lt;br&gt;
&lt;br&gt;
Emerging field: AI security testing is a nascent field, and this project is at the forefront of developing new methodologies and best practices.&lt;br&gt;
&lt;br&gt;
Future-oriented skills development: Students gain hands-on experience in AI security, preparing them for future careers in this growing field.&lt;br&gt;
&lt;br&gt;
Scalable model: This approach can be adapted by other institutions, potentially transforming how universities approach both AI security and student engagement.&lt;br&gt;
&lt;br&gt;
Addressing critical needs: As AI becomes more prevalent, ensuring its security is crucial. This project tackles this emerging challenge.&lt;br&gt;
&lt;br&gt;
This initiative embodies the spirit of innovation, tackles emerging technological challenges, and prepares students for the future of tech, making it an excellent fit for this track.                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Date &amp;amp; Time&lt;/div&gt;
                                    &lt;time datetime="2025-06-26T23:00:00Z"&gt;June 26, 2025 @ 4:00 pm&lt;/time&gt;
 - &lt;time datetime="2025-06-26T23:45:00Z"&gt;June 26, 2025 @ 4:45 pm&lt;/time&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Room&lt;/div&gt;
                                    MR 8                        &lt;/div&gt;
</description>
  <pubDate>Thu, 27 Mar 2025 00:02:13 +0000</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <guid isPermaLink="false">143 at https://uctech2025.ucr.edu</guid>
    </item>
<item>
  <title>CISO Panel </title>
  <link>https://uctech2025.ucr.edu/sessions/ciso-panel</link>
  <description>&lt;span&gt;CISO Panel &lt;/span&gt;
&lt;span&gt;&lt;span&gt;Anonymous (not verified)&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;&lt;time datetime="2025-03-26T09:19:59-07:00" title="Wednesday, March 26, 2025 - 09:19"&gt;Wed, 03/26/2025 - 09:19&lt;/time&gt;
&lt;/span&gt;
&lt;form class="content-moderation-entity-moderation-form" data-drupal-selector="content-moderation-entity-moderation-form-7" action="https://uctech2025.ucr.edu/taxonomy/term/43/feed" method="post" id="content-moderation-entity-moderation-form--7" accept-charset="UTF-8"&gt;
  &lt;input autocomplete="off" data-drupal-selector="form-brj9zu25w67ixfwo2sfgywou6tumj07w5ajt5xugrrw" type="hidden" name="form_build_id" value="form-Brj9ZU25W67iXfWo2SfgYWOu6TuMj07W5AJt5XugRRw"&gt;
&lt;input data-drupal-selector="edit-content-moderation-entity-moderation-form-7" type="hidden" name="form_id" value="content_moderation_entity_moderation_form"&gt;

&lt;/form&gt;
&lt;drupal-render-placeholder callback="flag.link_builder:build" arguments="0=node&amp;amp;1=131&amp;amp;2=follow_session" token="67hNntOp9wv3HE0z7A6V-yhAiiwYjg-gg_bajnaRt50"&gt;&lt;/drupal-render-placeholder&gt;
            The cybersecurity landscape is rapidly evolving, with new threats emerging at an alarming pace. This panel of UC CISOs will explore the most pressing cybersecurity challenges facing higher education, including AI-powered attacks, supply chain vulnerabilities, and the increasing sophistication of ransomware. The session will delve into strategic defense mechanisms, proactive threat mitigation, and the importance of collaboration across the UC system. Attendees will have the opportunity to engage with the panelists during an extended Q&amp;amp;A session.

    
    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Primary/Host Speaker&lt;/div&gt;
                                    
&lt;div class="cell uctech-speaker-details"&gt;
     &lt;div&gt;
  
  
              &lt;img loading="lazy" src="https://uctech2025.ucr.edu/sites/default/files/styles/medium/public/dewight_copy.jpg?itok=M8mpnS_7" width="171" height="220" alt="Dewight Kramer"&gt;


    
&lt;/div&gt;
 &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Dewight F. Kramer&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;Chief Information Security Officer&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC Riverside &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt; &lt;/p&gt;&lt;p&gt;It is my mission to serve the UC Riverside campus through improving the University's information security posture and thus helping UC Riverside better generate, advance, disseminate, and apply data and knowledge. This effort will enhance the ability of the UC Riverside community to teach, do research, and provide public service. I have a Masters of Science in Information Security and Assurance, and a Masters of Law. My area of interest is where law, Policy, privacy, and information security overlap.&lt;/p&gt; 
&lt;/div&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Additional Speakers&lt;/div&gt;
                &lt;div&gt;
                                    &lt;div&gt;
&lt;div class="cell uctech-speaker-details"&gt;
     &lt;div&gt;
  
  
              &lt;img loading="lazy" src="https://uctech2025.ucr.edu/sites/default/files/styles/medium/public/jaki_hsieh_wojan.png?itok=qD2XhPm_" width="177" height="220" alt="Jaki Hsieh Wojan"&gt;


    
&lt;/div&gt;
 &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Jaki Hsieh Wojan&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;Interim CIO and CISO&lt;/span&gt; at &lt;span class="speaker-campus"&gt; Division of Agriculture and Natural Resources &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt; &lt;/p&gt;&lt;p&gt;Jaki Hsieh Wojan&amp;nbsp;is the Deputy Chief Information Officer and Chief Information Security Officer at UC Agriculture and Natural Resources. With extensive experience in information security and IT leadership, Jaki Hsieh Wojan oversees cybersecurity strategy and risk management at UC ANR. In her dual role, she drives initiatives that ANR's digital landscape while aligning security priorities with broader technology goals. Jaki Hsieh Wojan is passionate about her role and finds purpose in the dynamic challenges and opportunities that come with leading information security and IT strategy.&lt;/p&gt; 
&lt;/div&gt;
&lt;/div&gt;                            &lt;/div&gt;
            &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Format&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session-format/panel" hreflang="en"&gt;Panel&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Skill Level&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session/skill-level/beginner" hreflang="en"&gt;Beginner&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Status&lt;/div&gt;
                                    Accepted                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/program-tracks/security-compliance-privacy" hreflang="en"&gt;Security, Compliance, &amp;amp; Privacy&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track Reasoning&lt;/div&gt;
                                    There are two tracks that this could be tagged as.  Security track or the Leadership track.  As this is a panel of CISOs I chose the security track.                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Date &amp;amp; Time&lt;/div&gt;
                                    &lt;time datetime="2025-06-26T20:00:00Z"&gt;June 26, 2025 @ 1:00 pm&lt;/time&gt;
 - &lt;time datetime="2025-06-26T20:45:00Z"&gt;June 26, 2025 @ 1:45 pm&lt;/time&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Room&lt;/div&gt;
                                    RC A                        &lt;/div&gt;
</description>
  <pubDate>Wed, 26 Mar 2025 16:19:59 +0000</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <guid isPermaLink="false">131 at https://uctech2025.ucr.edu</guid>
    </item>
<item>
  <title>Google SecOps - The journey in adopting a new SIEM and SOAR platform</title>
  <link>https://uctech2025.ucr.edu/sessions/google-secops-journey-adopting-new-siem-and-soar-platform</link>
  <description>&lt;span&gt;Google SecOps - The journey in adopting a new SIEM and SOAR platform&lt;/span&gt;
&lt;span&gt;&lt;span&gt;Anonymous (not verified)&lt;/span&gt;&lt;/span&gt;
&lt;span&gt;&lt;time datetime="2025-03-21T16:10:26-07:00" title="Friday, March 21, 2025 - 16:10"&gt;Fri, 03/21/2025 - 16:10&lt;/time&gt;
&lt;/span&gt;
&lt;form class="content-moderation-entity-moderation-form" data-drupal-selector="content-moderation-entity-moderation-form-8" action="https://uctech2025.ucr.edu/taxonomy/term/43/feed" method="post" id="content-moderation-entity-moderation-form--8" accept-charset="UTF-8"&gt;
  &lt;input autocomplete="off" data-drupal-selector="form-bm-oth4gprclx2a70qb30zkyqogsjdjcyifyisgw6bq" type="hidden" name="form_build_id" value="form-bm_OtH4GpRclx2a70QB30zKyQogSjdjCyIFYIsgW6BQ"&gt;
&lt;input data-drupal-selector="edit-content-moderation-entity-moderation-form-8" type="hidden" name="form_id" value="content_moderation_entity_moderation_form"&gt;

&lt;/form&gt;
&lt;drupal-render-placeholder callback="flag.link_builder:build" arguments="0=node&amp;amp;1=116&amp;amp;2=follow_session" token="OmeYrQy9TXc0No2m3kpAdkI1h_V9k-sPdzTx186gJeI"&gt;&lt;/drupal-render-placeholder&gt;
            &lt;p style="-webkit-text-stroke-width:0px;box-sizing:inherit;caret-color:rgb(0, 40, 122);color:rgb(0, 40, 122);font-family:&amp;quot;Fira Sans Regular&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Roboto, Arial, sans-serif;font-size:18px;font-style:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;line-height:1.5;margin:0px 0px 1rem;orphans:auto;padding:0px;text-align:start;text-decoration:none;text-indent:0px;text-rendering:optimizelegibility;text-transform:none;white-space:normal;widows:auto;word-spacing:0px;"&gt;UC Riverside's (UCR) initiative to shift legacy on-premise IT infrastructure and services to modern cloud-based solutions coincided with an initiative within the UCR Information Security Operations division&amp;nbsp;to revamp and improve the logging and log analysis capabilities for Security Operations. This resulted in the adoption of Google Chronicle (now Google SecOps) as a SIEM solution.&lt;/p&gt;

&lt;p style="-webkit-text-stroke-width:0px;box-sizing:inherit;caret-color:rgb(0, 40, 122);color:rgb(0, 40, 122);font-family:&amp;quot;Fira Sans Regular&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Roboto, Arial, sans-serif;font-size:18px;font-style:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;line-height:1.5;margin:0px 0px 1rem;orphans:auto;padding:0px;text-align:start;text-decoration:none;text-indent:0px;text-rendering:optimizelegibility;text-transform:none;white-space:normal;widows:auto;word-spacing:0px;"&gt;Between the time of acquisition and current day use of Google SecOps, there were many factors that shaped the journey that the UCR Information Security Operations division wishes to share with those interested in implementing a new SIEM/SOAR platform at their organization.&lt;/p&gt;

&lt;p style="-webkit-text-stroke-width:0px;box-sizing:inherit;caret-color:rgb(0, 40, 122);color:rgb(0, 40, 122);font-family:&amp;quot;Fira Sans Regular&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Roboto, Arial, sans-serif;font-size:18px;font-style:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;line-height:1.5;margin:0px 0px 1rem;orphans:auto;padding:0px;text-align:start;text-decoration:none;text-indent:0px;text-rendering:optimizelegibility;text-transform:none;white-space:normal;widows:auto;word-spacing:0px;"&gt;The UCR Information Security Operations division also will present guidance and recommendations to help make a SIEM/SOAR deployment more successful, whether with Google SecOps or another SIEM/SOAR platform.&lt;/p&gt;
    
    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Primary/Host Speaker&lt;/div&gt;
                                    
&lt;div class="cell uctech-speaker-details"&gt;
     &lt;div&gt;
  
  
              &lt;img loading="lazy" src="https://uctech2025.ucr.edu/sites/default/files/styles/medium/public/unnamed-3.jpg?itok=zLsJImcD" width="220" height="220" alt="Jonathan Ocab"&gt;


    
&lt;/div&gt;
 &lt;br&gt;
    &lt;h4 class="speaker-name"&gt;Jonathan Ocab&lt;/h4&gt;
    &lt;div class="speaker-info"&gt;
        &lt;span class="speaker-job-title"&gt;Manager of Information Security Operations&lt;/span&gt; at &lt;span class="speaker-campus"&gt; UC Riverside &lt;/span&gt;
    &lt;/div&gt;
    &lt;p class="speaker-bio"&gt; &lt;/p&gt;&lt;p&gt;Jonathan Ocab is a 20+ year employee of UC Riverside where he obtained his B.S. in Computer Science and started working in Information Technology as a UCR student employee. As the&amp;nbsp;Manager of Security Operations, Jonathan oversees the division that handles incident response for the campus. The Security Operations division also manages the various security tools and platforms used to monitor, detect, and remediate security threats to the UC Riverside community.&lt;/p&gt; 
&lt;/div&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Format&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session-format/standard-presentation" hreflang="en"&gt;Standard Presentation&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Skill Level&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/session/skill-level/advanced" hreflang="en"&gt;Advanced&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Status&lt;/div&gt;
                                    Accepted                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track&lt;/div&gt;
                                    &lt;a href="https://uctech2025.ucr.edu/program-tracks/security-compliance-privacy" hreflang="en"&gt;Security, Compliance, &amp;amp; Privacy&lt;/a&gt;                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div&gt;Session Track Reasoning&lt;/div&gt;
                                    Google SecOps is the security product by Google that is used for Security Information and Incident Management (SIEM) and Security Orchestration and Automated Response (SOAR). This is a platform solution that is specifically oriented towards increasing information security capabilities and supporting information security efforts.&lt;br&gt;
&lt;br&gt;
"Innovation and Emerging Technologies" would be a sub-track for this in that this presentation would cover the division's shift to new solutions, particularly ones that are also very new to the space and continuously evolving.                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Date &amp;amp; Time&lt;/div&gt;
                                    &lt;time datetime="2025-06-27T20:00:00Z"&gt;June 27, 2025 @ 1:00 pm&lt;/time&gt;
 - &lt;time datetime="2025-06-27T20:45:00Z"&gt;June 27, 2025 @ 1:45 pm&lt;/time&gt;
                        &lt;/div&gt;

    &lt;div&gt;
        &lt;div class="visually-hidden"&gt;Session Room&lt;/div&gt;
                                    MR 7                        &lt;/div&gt;
</description>
  <pubDate>Fri, 21 Mar 2025 23:10:26 +0000</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <guid isPermaLink="false">116 at https://uctech2025.ucr.edu</guid>
    </item>

  </channel>
</rss>
