- Learn what innovations to expect in the years to come.
- Understand how today’s investments are charting the course for tomorrow’s infrastructure.
- Discover how our work can be more inclusive and equitable for all.
- Explore the likely impacts of these efforts and learn to minimize the negatives and increase the positives.
Registration is now closed for MMC 2023!
The Henry, Autograph Collection
Fairlane Plaza
300 Town Center Dr
Dearborn, MI 48126
The discounted room block for MMC is now sold out. Click the following link to reserve your room at the regular rate:
The Henry Autograph Collection >
Additional local hotel options:
AGENDA
Senior Director of Technology and Telecommunications Policy | National Urban League
Read Abstract
The historic Infrastructure Investment and Jobs Act addresses all sides of the digital divide. The $65 billion of funds being deployed calls for continued commitment from policymakers, industry, and civil society to ensure equity. However, this should be viewed as a down payment on an investment towards a guarantee of a digital economy that allows all to participate as consumers, workers, and business owners. Alisa Valentin, Ph.D., will offer remarks on how centering civil rights and equity can guide and course-correct how we close the digital divide and thrive as a nation.
Director of Emerging Technology Research & Design | State of Michigan, DTMB, CTO
Read Abstract
Technologists use a few predominant ciphers to safeguard data-at-rest and data-in-transit. Breaking a cipher amounts to solving a math problem: With current technology, computations can take minutes, days, years — even centuries. Attendees will learn how the advent of quantum computing and the eventual realization of faster solutions may reduce this to hours or even seconds. Without unmanageably-frequent password and key changes, many of today's ciphers could be broken in near real-time. Will the market arrival of quantum computers bring an end to our refuge in this zone of non-computability? Will our cryptographic standards become useless or broken? We will explore the theory and discuss the efforts of the federal government (NIST, CISA) to get a jump on timely and future-proof alternative ciphers.
Disaster Recovery Planning Specialist | University of Michigan Information Technology Services (ITS) Information Assurance (IA)
Sasha WombleData Security Analyst | University of Michigan Information Technology Services (ITS) Information Assurance (IA)
Read Abstract
Disaster Recovery and Business Continuity are terms many people have heard but may not have a concrete understanding of what they mean. Without a plan for surviving a disaster, an organization risks a delayed recovery, prolonged service disruption, lost revenue, and reputational damage. This session will define these core concepts, overview the industry standard model for conducting this work, share methods to set an achievable scope, and discuss the common challenges that arise.
Learning Outcomes
- Define Disaster Recovery and related terms
- Identify critical systems and dependencies
- Resources to get started
Planner, Economic and Community Vitality | Southeast Michigan Council of Governments
Kristoffer TobbeChief Information Officer | Livingston County
Joe LaRussaMayor Pro Tem | City of Farmington
Larry NealDirector | Clinton-Macomb Public Library
Read Abstract
The presenters will demonstrate the Broadband Navigator as a tool that can help Michiganders understand the broadband ecosystem, as well as its constituent parts: infrastructure; mapping and data; digital literacy and digital equity; cybersecurity; policy; and funding. The Navigator also includes case studies of government, nonprofits, and industry across Southeast Michigan to understand and improve access to broadband internet. The presentation will showcase how this product came to be and what it aims to achieve, and will also show attendees how they can use the tool to learn more about broadband in general, as well as what resources they can access to achieve an equitably connected community. Attendees will learn how to access and explore the Navigator and what applicability the tool has for their communities.
Account Manager | Fortinet
Read Abstract
Higher education continues to be an inviting target for cybercrime and attacks by foreign state agents, hacktivists, and domestic criminal syndicates. Being resilient in a rapidly shifting cybersecurity landscape requires credible intelligence and sound strategies. Using cyber intelligence from multiple sources, this presentation will examine current and future higher education cyber threats. Content will include successful strategies like shifting from multiple-point solutions to innovative mesh architectures.
Senior Consulting Engineer | Juniper Networks
Mike FortenberrySenior Territory Account Manager | Juniper Networks
Read Abstract
In this presentation you will learn how the use of Artificial Intelligence, Machine Learning and Data Science techniques can significantly optimize the end user experience and dramatically improve network operations.
Director of Technology Impact Research | Merit Network
Research Associate, Quello Center for Media and Information Policy | Michigan State University
Digital Opportunity Fund Fellow | Benton Institute for Broadband & Society
Michalis Kallitsis, Ph.D.Research Scientist, Director, Merit Research & Development | Merit Network
Alexis Schrubbe, Ph.D.Executive Director | Data Science Institute, University of Chicago
Nick Feamster, Ph.D. (remote)Neubauer Professor of Computer Science and the Director of Research | Data Science Institute at the University of Chicago
Read Abstract
This session explores "Netrics", a new approach to measuring connectivity developed at the Internet Equity Initiative, part of the University of Chicago’s Data Science Institute. Merit Network and collaborators at Michigan State University have joined this effort to promote a robust, sustainable, and scalable framework for network performance measurements — and close the connectivity gap. Presenters will discuss a pilot study recently launched by Merit in the eastern Upper Peninsula of Michigan to demonstrate proof of concept and explore correlations between network performance and educational outcomes.
Michigan Cyber Partners Program Manager | State of Michigan, DTMB/MCS
Lori BourbonaisMichigan Secretary of State | Bureau of Election
Read Abstract
The Michigan Bureau of Elections and Michigan DTMB teamed up with local election officials from across the state to develop the Michigan Elections Lab to help local clerks explain how election security works. The lab details the multiple steps involved in running an election, including pre-election work of voter registration, ballot and tabulator programming, accuracy testing, and post-election audits. Each step describes the people, processes, and cross-checks that make our elections secure. Join us for a walk-through of the elections lab and ask your election security officials questions.
Researcher | The Hospital for Sick Children
Read Abstract
From the introduction of television in the mid-20th century to the introduction of the iPhone in 2007, screens have become increasingly powerful, portable, and prevalent. But screen technologies are often designed to keep us engaged as long as possible. Although immediate access to virtual social networks can provide social support, strengthen relationships, and increase feelings of connectedness, screens can also have negative impacts on our mental well-being. Attendees will get an overview of the current state of research on screens and mental health, and hear practical strategies on how to use screens to support healthy development.
Field CTO & Technical Director | Cortex Palo Alto Networks
Read Abstract
Join us as we explore the Palo Alto Networks' Security Operations Center. The session will look at operations, daily threat statistics, and how the security company defends itself against over 1 trillion security events per month from the most advanced threat actors on the planet.
TelNet Worldwide, Inc
Bill FisherConsultant | Ferris State University
Dennis BannonDirector of Technology | NE Michigan Community Mental Health
Jason LepperSystem Administrator | NE Michigan Community Mental Health
Pradip PatelDirector - Data Engineering | University of Michigan
Read Abstract
Communication is at the heart of every organization. Today’s organizations must navigate a plethora of workplace changes, faster pace of new technology and shifting telecom infrastructure.
Cloud-based systems and UCaaS platforms give leaders new opportunities to match today’s modern workforce and demands with more inclusive, flexible and scalable solutions that build momentum for the future.
Merit members share their journey to modernize their workplace communication technology and how they are migrating their communications to platforms that will support their team as they evolve.
President & CEO | Cimcor, Inc.
Read Abstract
Quantum has the potential to change our world significantly. This presentation will serve as an introduction to two emerging technologies: quantum computing and quantum communications. You will learn some fundamental concepts regarding quantum, how quantum computers work, why quantum communication is important, and some of the amazing problems we may one day solve by leveraging quantum. We will also explore the dark side of quantum computing and its potential impact on national security.
Director - Engineering | University of Michigan
Read Abstract
This session will explore the challenges and benefits of transitioning to cloud-based telephony in (Hybrid work environment) a higher-education setting by reviewing the experience of the University of Michigan. It will also include a discussion on 5G private cellular infrastructure and the added value of a private LTE/neutral host network in today's hybrid environment.
Chief Connectivity Officer | Michigan High-Speed Internet Office
State of Michigan | Dept. of Labor & Economic Opportunity
Data/Policy Program Manager | State of Michigan, High Speed Internet Office
Ben FinemanFederal Program Officer | Michigan U.S. Department of Commerce, NTIA
Read Abstract
The Michigan High-Speed Internet Office (MIHI) is working to implement programs from the Bipartisan Infrastructure Law that are designed to expand high-speed internet service to every home, business, and institution in the state and encourage Michiganders to adopt it, as well as address other challenges of the digital divide. Join the MIHI Office and staff from the National Telecommunications and Information Administration to hear about these programs and how you can be part of the efforts to connect every Michigan resident and community.
CISSP, CISM, Chief Information Security Officer | Merit Network
David SullivanCyber Security Engineer | Merit Network
Read Abstract
As a statewide research and education network, Merit has a unique vantage point to watch for cyber threats against our members. By combining this capability with advanced automation, intelligence, and the skills of our Information Security team, we are creating a Security Operations Center (SOC) that will allow you to identify, respond to, and block threats like never before. Join us as we share a sneak peek of this new service, focused on providing effective alerting, cyber intelligence, and community-building in a way that every organization — from libraries to universities — can take advantage of.
SVP, Sales | eX² Technology
Chance EikerDirector of Operations | eX² Technology
Read Abstract
This session will discuss key frameworks and practical approaches on how public and private leaders successfully manage the 3C’s (contemplation, collaboration and construction) of a P3 broadband network deployment in understandable terms. During this session, the speakers will present best-in-industry thoughts on how to contemplate, collaborate and construct fiber broadband infrastructure within your communities, starting with an explanation of different P3 models and how to select the best model for your goals. Successful P3 work when private operators mutually benefit along with the public entity. This session will explore why it’s important for public leaders to understand key business drivers of private broadband operators and how they tend to think about their business models. Finally, the best laid plans fall short if constructability isn’t considered. You will learn about the diverse ways to manage and build out infrastructure and leave prepared to take advantage of this once-in-a-generation funding opportunity.
Senior Solutions Engineer | Akamai Technologies
Read Abstract
In the security world, data science means using algorithms to reveal malicious activity in near real-time by processing massive volumes of data. Contemporary internet threats are sophisticated and adaptable, continuously changing their complexion to evade security defenses. At the same time, security researchers are discovering some sources of security data are either unavailable or opaque due to encryption and the need to ensure personally identifiable information (PII) is always properly protected. This session explores the current threat landscape and how security researchers use DNS threat data to discover new phishing domains, predict the creation of DGA domains used in command and control infrastructure, and spot patterns of DNS data exfiltration. It also will explain why DNS resolution data is a rich resource for security research and discuss improvements in threat coverage, accuracy, and responsiveness.
Founder & CFG (Chief Fan Grrrl) | SpeakUP
Read Abstract
Boldly go where not enough organizations have gone before: innovative inclusive learning and working environments that understand and empower the Superheroes in their midst! Discover a unique strengths-based perspective that shatters the myths and stigma around mental health and neurodivergence. With Avengers and X-Men, gain insight and evidence-based tools for engagement and empowerment that benefit everyone in your organization. Get ready to make real change, shake up the status quo, and have fun too!
Senior Grants Development Consultant, Grants Office
Chris Greene HutchingsProgram Manager, Michigan Moonshot
Read Abstract
Over $1 billion in federal and state grants to expand broadband access in Michigan will be available in the coming 18 months. These funds come from different programs with differing requirements and processes. Fortunately, best practices to prepare your submission are the same for nearly all broadband grants. Join Liz Shay from Grants Office LLC and Chris Greene Hutchings from the Michigan Moonshot to learn how to plan and build a competitive grant proposal.
CEO & Founder | Lit Communities
Kristoffer TobbeCIO | Livingston County
Read Abstract
The structure of your public-private partnerships (“P3”) will make all the difference in the short- and long-term success of a community network initiative. There is no one-size-fits-all solution, just as no one community is the same as the next. The ultimate success of any P3 arrangement comes down to the right balance of risk and control between the public and private entities. How do you get started, and what does it mean to build a truly community-minded P3 partnership? Kristoffer Tobbe, CIO of Livingston County, and Brian Snider, CEO of Lit Communities, will discuss their most recent P3 agreement, the journeys that brought them to this point, and the pathway forward as they work to connect all Livingston County residents.
Director of Sales | PFN - Peninsula Fiber Network
Jay RobisonNational Channel Manager | 911inform
Read Abstract
Taking Security for Education and the Enterprise to the Next Level with PFN and 911inform
Tragedies are reported in the news daily, and institutions throughout the US are searching for a better way to be prepared for emergencies of all kinds. The PFN and 911inform teams will provide an opportunity to learn and see via a live demo:
- 911 compliance and laws
- How to gain visibility to cellular 911 calls instantly
- Effectively using safety technology during an emergency
- How to bring silo-ed technology into a more usable common platform
- Providing access to this technology for public safety during an emergency
EVP | RF Connect
Read Abstract
The impact of the digital divide on education is significant because broadband access is vital to ensure that all students have the same opportunities to learn and succeed. The uncomfortable truth is decades of funding initiatives have failed to significantly narrow — much less bridge — the divide the divide. That’s primarily attributed to the fact that learning institutions must make tradeoffs when it comes to connectivity and because they are simply at the mercy of service providers. The next wave of connectivity no longer belongs to internet providers or cellular carriers but instead to schools. Recent innovations empower nearly any organization to use carrier-grade cellular spectrum to build a private wireless network without the prohibitive costs of owning or licensing the spectrum. More importantly, schools can for the first time control their broadband destiny so that all students have equal access to digital technologies.
Co-founder & COO | Inpathy
Read Abstract
Guided by a focus on the future of responsible tech and evidence-based interventions, presenter Kathryn Smith Pierre will share insights based on Inpathy’s research and her work as a mental health professional over the past decade in the US and Asia. Participants will have the opportunity to engage in discussion pertaining to social media use during a global mental health crisis, including social media’s risks and rewards; creating healthy digital identities; pedagogical strategies; and advocacy and activism through storytelling.
Read Abstract
Join us for an afternoon of networking and connection, presented by our MMC Gold Sponsor, Lit Communities. Try the Andorian Ale or a favorite libation, paired with the opportunity to expand your professional network, forge new partnerships, and strengthen existing ones. Engage with our Merit community and boldly network like never before!
Read Abstract
We do things differently. We partner with municipalities to build fiber networks in a way that keeps your community’s needs front and center every step of the way. Our community assessments are comprehensive and specific, so you have a clear plan forward to a sustainable fiber network. We don’t manage your network from some faraway city. We build and operate an ISP in your community to employ your residents and guarantee excellent service, and invite community-oriented companies to bring you telehealth services, smart city applications, and other modern solutions over the network we build.
Federal Program Officer | Michigan U.S. Department of Commerce, NTIA
Read Abstract
Many Michigan residents are challenged not only by the lack of universal high-speed internet infrastructure, but also by the lack of digital inclusion resources to access and use the infrastructure that is already available. In the coming months and years we will be seeing once in a generation federal investment in Michigan to address these issues, but successful implementation will require collaboration between a diverse group of stakeholders. In this session, we will dive more deeply into digital equity enablement, upcoming federal funding opportunities including the Broadband, Equity, Access, and Deployment Program (BEAD) and the Digital Equity Act (DEA), and how community anchor institutions can participate in this critical work.
Network Operations Performance Manager | Merit Network
Michael MillikenVice President for Network Technology and Innovation | Merit Network
Wade WulsterAccount Manager, Enterprise | Adva/AdTran
Keith CastelinoSystem Consultant | Adva/AdTran
Read Abstract
Project MOON-Light: Merit's Statewide Foundation for Digital Infrastructure
Learn about Merit's new Project MOON-Light (Michigan Open Optical Network-Leveraging Innovation to Get High-Speed Technology for all), which aims to make our state the best connected in the nation. One of the first next-generation infrastructure projects of its kind in the country, MOON-Light solves the middle-mile problem where communities have few or no options in connecting their local last-mile networks to the greater internet. The statewide infrastructure upgrade will allow Merit to collaborate with community and private providers on last-mile network expansions. Services are set to begin in fall, helping to deliver affordable broadband network access, enhance quality of life, and provide equitable opportunities for all. In this session, teams from Merit and fiber networking company Adtran will outline how using an "all-coherent" architecture supported by advanced tooling systems supports this project.
CISSP, CISM, Chief Information Security Officer | Merit Network
Aaron ElebyCyber Security Analyst | Merit Network
Read Abstract
Ensuring that our users follow our cybersecurity guidance is something that never ends. But how do we measure if our training and efforts are doing anything? By testing, of course! Merit's cybersecurity program has evolved to the point where performing more advanced testing, such as placing lost "malicious" USB drives around the office, is required to keep attention high and potential threats away. In this session, you will learn how to ensure your organization is ready for such testing, how to design an effective USB drop campaign, how to execute the test while retaining support and engagement, and how to report and communicate your results to leadership and staff.
Chair | Beaver Island Townships Joint Telecommunications Advisory Committee
Dick MulvihillPresident | Beaver Island Association
Read Abstract
For too long small communities have had their digital future tied to the whims of profit-seeking companies that receive federal and other public funding to build inadequate, out-of-date broadband infrastructure. It's time to change that. Beaver Island is working to make that change by exploring opportunities for it to be a partner and have a voice in next-generation telecom infrastructure. What we need to be competitive may not be commercially viable, so we are exploring ways to close that gap while making sure our tax dollars are used to fund systems we control. Attendees will learn about our efforts and the processes we have used on the island to close the services gap, including our community-built interim system and our plans to drive funding to support a community system.
VP of Hybrid Cloud | People Driven Technology
Read Abstract
In this session, we will discuss "bad actor" tactics and their methodologies as it pertains to cyber defense and recovery. Participants will learn from examples of successful and failed results. We'll take a deep dive into architectures that can improve cybersecurity posture and recoverability. The right knowledge empowers you to build a better defense. Follow-up sessions will be made available to continue the discussion and address attendees' particular needs and concerns.
Solutions Engineer | F5
Josh BrooksSolutions Architect | WorldTech IT
Read Abstract
Supercharge your security, thwart bot attacks, and protect your apps with intelligence — without lifting a finger — thanks to F5 + WorldTech IT. Our expert engineers are here to support our bold claims and demonstrate our tech. Attendees will experience the difference when working with F5 Distributed Cloud and WorldTech IT, see a live demonstration of our Web App & API Protection, and learn how to extend their security team’s efficiency with App Infrastructure Protection. The presentation will conclude with a question-and-answer session that will answer any bold security questions or security pain points you may have.
Professor of Information Technology | Macomb Community College
Paige BarnesInformation Systems Security Analyst | Macomb Community College
Read Abstract
In 2016, our community college created a project for advanced cybersecurity students to conduct a vulnerability analysis of the college to gain real-world experience. The project has been so successful that their vulnerability analysis reports have become part of the college’s regular internal security studies and documentation. The project has provided students with valuable hands-on experience with the tools and techniques used to identify vulnerabilities. They report those findings back to the customer in a written report and group presentation. The analysis covers areas such as internal and external scans, physical security, and social engineering. Students conduct the analysis with guidance from the instructor and the security department, but the students perform all the work themselves, including writing the report and presenting their findings.
Program Manager | Michigan Moonshot
Paul SachsDirector of Strategic Impact | Ottawa County
Lucy BlairCommunications Director | Calhoun County
Gregg ToddCounty Controller/Administrator | Ingham County
Read Abstract
This session will help attendees understand the Michigan Moonshot from Michigan communities that have been through the process. Key topics include data collection, validating availability of service, and how to use this information to help your community broadband plan Boldly Go!
Head of Operations | EntryPoint Networks
Read Abstract
COVID-19 moved essential day-to-day interactions online, and those without reliable, high-speed access are being left behind. As broadband shifted from an amenity to a necessity, Detroit adopted a bold and sweeping plan capable of closing the gaps by improving access and affordability. What motivated Detroit leadership to adopt such a plan? How does the plan demonstrate a nuanced understanding of the complex issues associated with digital equity? What risks does the City face as it advances its agenda and what lessons can other communities take away from Detroit’s experience? These questions and more will be considered in an in-depth consideration of the Detroit plan with audience discussion.
Senior Solutions Architect | Presidio
Jeremy Hile-HofferSolution Engineer | Netskope
Read Abstract
Zero Trust has become an overused marketing term in the security industry, but it doesn’t mean its without value. In our discussion we will give an overview of how you can find out what Zero Trust means to your organization and how Presidio and Netskope can facilitate your journey toward a Zero Trust Architecture. You’ll walk away with a better understanding of how Zero Trust is more than a buzzword and can help your organization achieve a higher security posture.
Chief Technology Advisor - Higher Education | World Wide Technology
Read Abstract
IT organizations need to chart an appropriate course to deliver valuable outcomes through innovative, reliable, and secure digital solutions. At the same time, they must address the challenges in obtaining and retaining the skills to effectively and efficiently make the journey. Drawing from his experience in higher education and consulting, Michael Sink will discuss the importance of a comprehensive approach to digital service delivery. This includes navigating the functional and technical ecosystem, addressing security risks, and seeking flexible ways to acquire the appropriate skills.
CISSP, CISM, Chief Information Security Officer | Merit Network
Bryan RobinsonCyber Security Engineer | Merit Network
Read Abstract
For us to be effective in cybersecurity, not only do we need to protect the easy things we know about, but also the difficult or hidden network devices which we are forced to support. Consumer, personal, and IoT devices pose a particular challenge, as we must learn to not only discover these devices on our network, but understand them, take ownership of their consequences, and build an effective security program around their use. Attackers will always succeed by compromising the weakest link in your cyber chain, and for far too long we have just characterized these unmanaged endpoints as not being worthy of our concern. This stops now!
In this introductory session on device discovery and management, attendees will learn how to gain a full understanding of the network devices they support (whether they like it or not) and how to apply cybersecurity concepts properly to these IoT and consumer products that refuse to be managed by normal means.
Senior Business Systems GIS and Data Analyst | Merit Network
Tim LauxmannGeodata Manager | DTMB/Center for Shared Solutions
Read Abstract
This three-hour workshop will walk you through creative applications of graphical information systems (GIS) for community connectivity. Unlock the power of GIS by learning from industry experts and network operators. Don't currently have GIS capabilities in your municipality or organization? Participants will learn about basic GIS resources used in broadband expansion initiatives, presented with GIS use cases and demonstrations.
Director of Technology Impact Research | Merit Network
Research Associate, Quello Center for Media and Information Policy | Michigan State University
Read Abstract
This session will introduce the Digital Opportunities Compass framework that can be used to guide state and local digital inclusion planning at a moment of unprecedented investment in broadband infrastructure and digital equity. The framework was developed in partnership with researchers at Merit, the Quello Center at MSU, the Digital Equity Research Center, and the National Digital Inclusion Alliance. As communities and states develop plans to improve digital equity, it is important to establish a shared framework to set goals and priorities, identify opportunities, and monitor progress toward these goals. The Digital Opportunities Compass can be used to gain a holistic picture of digital equity in a community, identify key factors that influence outcomes, and support planning and strategy development.
CISSP, CISM, Chief Information Security Officer | Merit Network
Bryan RobinsonCyber Security Engineer | Merit Network
Read Abstract
Security Workshop continued
Senior Business Systems GIS and Data Analyst | Merit Network
Mark HolmesCSS Geospatial Services Manager | DTMB - Community broadband expansion through GIS
Read Abstract
GIS Workshop continued
Director of Technology Impact Research | Merit Network
Research Associate, Quello Center for Media and Information Policy | Michigan State University
Read Abstract
Research Workshop continued