Join us to go over the successes (and failures) we’ve encountered in leveraging MECM as Unit IT Pros. Topics will include: Leveraging Task Sequences Collection Management Deployment Settings & Behaviors Maintenance Windows End-user Experience About this event: Presenters: Chad Hankins, Desktop Support Lead, Prairie Research Institute Melba Goliday, Instructional Lab Software Specialist, Information Technology Partners […]
Category: D
Apple at Illinois Spring Update
Tags: Paul RobertsSpring update on macOS, iOS and AppleTV at Illinois. Mike Kimmel, our campus Apple System Engineer, will be on hand to answer questions. About this event: Presenters: Paul Roberts, Senior Endpoint Services Specialist, Technology Services Mike Kimmel, Systems Engineer, Apple Track: Software/Endpoint Management Experience Needed: All Levels Learning Outcome: The last Apple best practices for […]
Scaling Agile Across the Enterprise: An Introduction to SAFe
Tags: Julie Ann CampbellAs organizations grow, so do the challenges of maintaining agility, alignment, and fast delivery. The Scaled Agile Framework (SAFe®) offers a structured approach for extending Agile principles beyond individual teams to entire programs, portfolios, and enterprises. This session will provide a practical introduction to SAFe, including its core values, key roles, scaling configurations, and the […]
Vulnerability Management by the Numbers
Tags: Katie Lackermann, Richard DonovanCybersecurity vulnerabilities are proliferating at an unprecedented rate, making it increasingly difficult to determine where to focus remediation efforts—and whether those efforts are truly reducing risk. In this presentation, we will share key vulnerability metrics, trends, and actionable insights from the past year at the University. We will also demonstrate how IT professionals can leverage […]
Think Like a Privacy Pro: Privacy in Practice
Tags: Ece Gumusel, Gowri Balasubramaniam, Mendi Drayton, Sheena BishopPrivacy isn’t just a legal or compliance issue, it is daily practice that every IT Pro plays a role in upholding. In this session, we’ll discuss what it means to “think like a Privacy Pro” in the context of everyday decision-making. We’ll walk through how we apply core privacy frameworks like the Fair Information Practice […]
Automating Cybersecurity Operations with TeamDynamix
Tags: Steve Fletcher, Tamara YelamanchiliDiscover how the Cybersecurity Operations Center (CSOC) improved efficiency and user experience by automating previously manual processes using TeamDynamix (TDX) ticket workflows, forms, and automation. In this session, we’ll walk through real-world examples where custom forms and workflows were designed to simplify service requests and approvals, reducing turnaround time and human error. We’ll also showcase […]
Automate your day: Microsoft Teams Workflow and Power Automate
Tags: Ginger Hundgen, Sarah FollmerJoin us for an engaging two-part workshop designed for individuals with little to no technical background. This workshop will introduce you to the powerful automation capabilities of Microsoft Teams Workflow and Power Automate, helping you streamline your daily tasks and enhance productivity. Workshop Structure: Part 1- Fundamentals: Understand the basics of Microsoft Teams Workflow and […]
Building a Daily Data Pipeline: Automating SharePoint Excel to SQL
Tags: Dejan Trencevski, Lauren Gray, Sahar PaniThis presentation highlights a project where our team needed to automate the integration of an Excel file stored in SharePoint into SQL, refreshing the data daily to provide estimated enrollments. While this task may seem simple at first glance, it required careful planning and infrastructure setup.We began by establishing a secure connection between SharePoint and […]
Zeeking out the bad guys. An overview of campus network security automation.
Tags: Ryan Northrop, Steven AldridgeThe campus network is attacked thousands of times per day. Join the Cybersecurity Engineering team as they give an overview of how they leverage network security tools and automation to detect and thwart these malicious actors. About this event: Presenters: Steven Aldridge, Senior Cybersecurity Engineer, Technology Services Ryan Northrop, Lead Cybersecurity Engineer, Technology Services Track: […]
Access Rights Management (ARM): Updates on project progress
Tags: Beth McCarter, Tanya WilliamsonThe Access Rights Management (ARM) project team is working to create an easy-to-use access management system that efficiently facilitates requests, approvals, provisioning, certifications, and governance related to University of Illinois enterprise systems. In this session we will provide a short recap of how this project came to be, share goals we aim to accomplish, and […]