MECM – What Works for Us

Tags: ,

Join us to go over the successes (and failures) we’ve encountered in leveraging MECM as Unit IT Pros. Topics will include: Leveraging Task Sequences Collection Management Deployment Settings & Behaviors Maintenance Windows End-user Experience About this event: Presenters: Chad Hankins, Desktop Support Lead, Prairie Research Institute Melba Goliday, Instructional Lab Software Specialist, Information Technology Partners […]

Ctrl + Alt + Adapt: Rebooting Your Approach to Change

Tags: ,

Change management is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state.This change management session aims to equip the audience with the knowledge and tools to effectively manage and lead change within their organization, with real world change management examples in Higher Education AND fun quiz […]

Introduction to Data Literacy: A Practical Course Walkthrough for University Staff

Tags:

In this session, I’ll walk through Introduction to Data Literacy, a course developed to help university staff and faculty build a foundational understanding of data use within a higher ed environment. The course covers key topics such as data ethics, security, regulations, and university-specific processes for accessing and working with data. This session will follow […]

AI in Zoom and Microsoft Teams

Tags:

An overview and update on the current features/capabilities of Zoom’s AI Companion and Microsoft Teams Copilot/Teams Premium. About this event: Presenters: Michael Cervone, Product Owner, Technology Services Track: Service/Unit Overviews and Updates Experience Needed: All Levels Learning Outcome: Additional Keywords: AI, Generative AI, Zoom, Teams, Videoconferencing When and where:

Vulnerability Management by the Numbers

Tags: ,

Cybersecurity vulnerabilities are proliferating at an unprecedented rate, making it increasingly difficult to determine where to focus remediation efforts—and whether those efforts are truly reducing risk. In this presentation, we will share key vulnerability metrics, trends, and actionable insights from the past year at the University. We will also demonstrate how IT professionals can leverage […]