.

SUMIT 2020 — SUMIT Reimagined

SUMIT 2020 went online as SUMIT Reimagined, a series of informational events where members of the U-M community could get help from IT experts on a variety of topics. Check out the list of events below for links to presentation slides and recordings.

The Future of Cybersecurity: Predicting the Unpredictable? Recording of the livestream conversation from October 30. A fireside chat with Gee Rittenhouse (SVP and General Manager, Cisco Security Business Group), Dug Song (Co-Founder and General Manager of Duo Security at Cisco), and Dr. Ravi Pendse (U-M Vice President for Information Technology and Chief Information Officer). They will discuss the future of cybersecurity and what individuals, organizations, and society should be thinking about to stay ahead of cyber-criminals and other threat actors.

SUMIT 2020 by the numbers:
Graphic with participation stats for SUMIT 2020.

click to enlarge

October 7, 12-1 p.m.—Virtru: Enhanced Email Security for Gmail. Virtru is an easy to use, email security enhancement tool for Gmail. Available to all Google at U-M Gmail users, it simplifies end-to-end email encryption and more. Join Dennis Neil, IT Security Design and Engineering Manager and brian cors, Collaboration Services Manager, to learn more and get started.

October 9, 2-4 p.m.—Drop-in: Ask a Security Analyst. Need help finding information on how to securely connect to campus? Have questions about where to store sensitive data? Want to understand requirements around working with third party vendors? Bring your questions to our weekly Information Assurance office hours! Every week IA staff will be available for short one-one-one drop in sessions to answer your questions and help you find the resources you need. Open to all faculty, staff, and students on campus.

October 14, 12-12:45 p.m.—Privacy and Appropriate Use of Data. Presentation Slides. Join us for a discussion of the value of privacy and U-M’s approach to personal data protection in a world of ubiquitous technology and big data.

October 16, 1-2 p.m.—Duo Two-Factor—Explore Your Duo Options. Are you planning to get the iPhone and confused about how to register it in Duo? Are you traveling and not quite sure about your Duo options? Do you have a general question about Duo? If so, your Duo support team is here to help. We will have short one-on-one sessions available with IA staff to answer your questions and help you with Duo. Open to all faculty, staff, and students on campus.

October 16, 2-4 p.m.—Drop-in: Ask a Security Analyst. Need help finding information on how to securely connect to campus? Have questions about where to store sensitive data? Want to understand requirements around working with third party vendors? Bring your questions to our weekly Information Assurance office hours! Every week IA staff will be available for short one-one-one drop in sessions to answer your questions and help you find the resources you need. Open to all faculty, staff, and students on campus.

October 21, 11:30 a.m.-12:30 p.m.—Classifying Data at U-MPresentation Slides. The management and protection of data at U-M is informed by the data’s level of sensitivity. Learn more about U-M’s data classification levels, see examples, participate in a data classification exercise, and find out how we protect sensitive data at U-M.

October 22, 1-2 p.m.—Duo Two-Factor—How to Get Your Systems Connected. Do you have questions about how to add Duo to the various systems and applications you manage?  We’ll walk through the set up for protecting RDP and SSH connections and also discuss options for protecting web applications.

October 23, 2-3 p.m.—Federation & Social Login. Do you want to make it easier for people who don't have a UMICH account to log in to your U-M service? Do you want to learn about alternatives to using Friend, Sponsored, or local accounts with your U-M service? Join us to learn about how to enable people to use accounts they already have to log in to U-M services. We will cover allowing people to use harvard.edu, stanford.edu, or other similar accounts. We will also cover allowing people to use social accounts from gmail.com, microsoft.com, linkedin.com, and others.

October 23, 2-4 p.m.—Drop-in: Ask a Security Analyst. Need help finding information on how to securely connect to campus? Have questions about where to store sensitive data? Want to understand requirements around working with third party vendors? Bring your questions to our weekly Information Assurance office hours! Every week IA staff will be available for short one-one-one drop in sessions to answer your questions and help you find the resources you need. Open to all faculty, staff, and students on campus.

October 28, 11:30 a.m.-12:30 p.m.—Third Party Vendor Security Revisions. Last year the university released 13 Information Security standards that outline minimum security requirements in a variety of areas. Based on feedback from campus units, a working group made up of representatives from across campus made recommendations for improvements and modifications for DS-20 - Third Party Vendor Security & Compliance. We’ll review the modifications in this session and help you understand your responsibilities when using a third party vendor to store, transmit, or process U-M sensitive data.

October 29, 2-2:45 p.m.—Seven-Month Check-In: Remote IT Security. Seven months in to remote work, school, and research, do you have the resources you need? At this session IA will review our existing educational materials around remote access and discuss some new security tools that can help secure your remote systems. We’ll also have an open discussion with you about what problems you are still facing and how we can help.

October 30, 12-1 p.m.—The Future of Cybersecurity: Predicting the Unpredictable? Recording of the livestream conversation. Join us for a fireside chat with Gee Rittenhouse (SVP and General Manager, Cisco Security Business Group), Dug Song (Co-Founder and General Manager of Duo Security at Cisco), and Dr. Ravi Pendse (U-M Vice President for Information Technology and Chief Information Officer). They will discuss the future of cybersecurity and what individuals, organizations, and society should be thinking about to stay ahead of cyber-criminals and other threat actors.

October 30, 2-3 p.m.—Eating the MUTN: Michigan Utilities for daTa and vulNerability discovery. U-M utilizes some unique and powerful tools to quickly discover vulnerabilities and sensitive data.  These tools include the new, open-source WebStor, which was recently created at U-M for quickly identifying vulnerable websites, as well as a sensitive data discovery framework consisting of SeekerDLP, custom middleware, and a user-facing web portal for managing results of sensitive data detected on various types of systems. Tune in if you're interested in innovative, cost-effective approaches for discovering sensitive data and vulnerable websites.

October 30, 2-4 p.m.—Drop-in: Ask a Security Analyst. Need help finding information on how to securely connect to campus? Have questions about where to store sensitive data? Want to understand requirements around working with third party vendors? Bring your questions to our weekly Information Assurance office hours! Every week IA staff will be available for short one-one-one drop in sessions to answer your questions and help you find the resources you need. Open to all faculty, staff, and students on campus.

October 19–30—Cybersecurity Challenge for students. Students on the Ann Arbor campus will receive an email invitation to test their IT security knowledge by taking the Cybersecurity Challenge. Those who complete the online questions with a score of 90% or higher will be entered into a drawing for prizes.