skip to Main Content

Merit Member Conference
May 16 & 17, 2023 | The Henry | Dearborn, MI

 

We are currently in an era of unprecedented federal infrastructure investment.

 

How can we capitalize on today’s opportunities to continue to build positive momentum going into the future? How can we ensure the investments result in positive outcomes for our institutions, communities and citizens across Michigan? This year’s Merit Member Conference (MMC) asks participants to look to the future and explore where we will Boldly Go, together.

 

  • Learn what innovations to expect in the years to come.
  • Understand how today’s investments are charting the course for tomorrow’s infrastructure.
  • Discover how our work can be more inclusive and equitable for all.
  • Explore the likely impacts of these efforts and learn to minimize the negatives and increase the positives.

 

Set course for MMC 2023, register at warp speed, and engage!

Registration is now closed for MMC 2023!

Merit Member Conference Location

The Henry, Autograph Collection
Fairlane Plaza
300 Town Center Dr
Dearborn, MI 48126

Get Directions >

About Dearborn >

The discounted room block for MMC is now sold out.  Click the following link to reserve your room at the regular rate:

The Henry Autograph Collection >

1-888-709-8081

Additional local hotel options:

Courtyard Marriott – Dearborn >

Extended Stay America – Dearborn >

AGENDA

Day #1 - May 16, 2023
8:00 - 8:30 A.M. | Breakfast and Registration
8:35 A.M. - 8:55 A.M. | Opening Remarks
9:00 A.M. - 9:45 A.M. | Morning Keynote
Our Digital Future: Unlocking Economic Opportunity and Ingenuity
Dr. Alisa Valentin

Senior Director of Technology and Telecommunications Policy | National Urban League

Read Abstract

The historic Infrastructure Investment and Jobs Act addresses all sides of the digital divide. The $65 billion of funds being deployed calls for continued commitment from policymakers, industry, and civil society to ensure equity. However, this should be viewed as a down payment on an investment towards a guarantee of a digital economy that allows all to participate as consumers, workers, and business owners. Alisa Valentin, Ph.D., will offer remarks on how centering civil rights and equity can guide and course-correct how we close the digital divide and thrive as a nation.

10:00 A.M. - 10:45 A.M. | Session 1
Breakout 1 - Quantum Computing and the Emerging Cryptographic Risk
Paul Groll

Director of Emerging Technology Research & Design | State of Michigan, DTMB, CTO

Read Abstract

Technologists use a few predominant ciphers to safeguard data-at-rest and data-in-transit. Breaking a cipher amounts to solving a math problem: With current technology, computations can take minutes, days, years — even centuries. Attendees will learn how the advent of quantum computing and the eventual realization of faster solutions may reduce this to hours or even seconds. Without unmanageably-frequent password and key changes, many of today's ciphers could be broken in near real-time. Will the market arrival of quantum computers bring an end to our refuge in this zone of non-computability? Will our cryptographic standards become useless or broken? We will explore the theory and discuss the efforts of the federal government (NIST, CISA) to get a jump on timely and future-proof alternative ciphers.

Breakout 2 - Disaster Recovery and Business Continuity Explained
Stephanie Henyard

Disaster Recovery Planning Specialist | University of Michigan Information Technology Services (ITS) Information Assurance (IA)

Sasha Womble

Data Security Analyst | University of Michigan Information Technology Services (ITS) Information Assurance (IA)

Read Abstract

Disaster Recovery and Business Continuity are terms many people have heard but may not have a concrete understanding of what they mean. Without a plan for surviving a disaster, an organization risks a delayed recovery, prolonged service disruption, lost revenue, and reputational damage. This session will define these core concepts, overview the industry standard model for conducting this work, share methods to set an achievable scope, and discuss the common challenges that arise.

Learning Outcomes

  • Define Disaster Recovery and related terms
  • Identify critical systems and dependencies
  • Resources to get started
Breakout 3 - Southeast Michigan Broadband Navigator Demonstration and Best Practices Showcase
Noah Bussell

Planner, Economic and Community Vitality | Southeast Michigan Council of Governments

Kristoffer Tobbe

Chief Information Officer | Livingston County

Joe LaRussa

Mayor Pro Tem | City of Farmington

Larry Neal

Director | Clinton-Macomb Public Library

Read Abstract

The presenters will demonstrate the Broadband Navigator as a tool that can help Michiganders understand the broadband ecosystem, as well as its constituent parts: infrastructure; mapping and data; digital literacy and digital equity; cybersecurity; policy; and funding. The Navigator also includes case studies of government, nonprofits, and industry across Southeast Michigan to understand and improve access to broadband internet. The presentation will showcase how this product came to be and what it aims to achieve, and will also show attendees how they can use the tool to learn more about broadband in general, as well as what resources they can access to achieve an equitably connected community. Attendees will learn how to access and explore the Navigator and what applicability the tool has for their communities.

Sponsor Presentation: Fortinet - Risky Business for the Next Academic Year
Greg Kreiling

Account Manager | Fortinet

Read Abstract

Higher education continues to be an inviting target for cybercrime and attacks by foreign state agents, hacktivists, and domestic criminal syndicates. Being resilient in a rapidly shifting cybersecurity landscape requires credible intelligence and sound strategies. Using cyber intelligence from multiple sources, this presentation will examine current and future higher education cyber threats. Content will include successful strategies like shifting from multiple-point solutions to innovative mesh architectures.

Merit Community Supporter Presentation: Juniper Networks - The Network for the Next Decade
Thomas Sophiea

Senior Consulting Engineer | Juniper Networks

Mike Fortenberry

Senior Territory Account Manager | Juniper Networks

Read Abstract

In this presentation you will learn how the use of Artificial Intelligence, Machine Learning and Data Science techniques can significantly optimize the end user experience and dramatically improve network operations.

11:00 A.M. - 11:45 A.M. | Session 2
Breakout 1 - Exploring the 'Netrics' Approach to Connectivity Measurement
Pierrette Dagg

Director of Technology Impact Research | Merit Network
Research Associate, Quello Center for Media and Information Policy | Michigan State University

Digital Opportunity Fund Fellow | Benton Institute for Broadband & Society

Michalis Kallitsis, Ph.D.

Research Scientist, Director, Merit Research & Development | Merit Network

Alexis Schrubbe, Ph.D.

Executive Director | Data Science Institute, University of Chicago

Nick Feamster, Ph.D. (remote)

Neubauer Professor of Computer Science and the Director of Research | Data Science Institute at the University of Chicago

Read Abstract

This session explores "Netrics", a new approach to measuring connectivity developed at the Internet Equity Initiative, part of the University of Chicago’s Data Science Institute. Merit Network and collaborators at Michigan State University have joined this effort to promote a robust, sustainable, and scalable framework for network performance measurements — and close the connectivity gap. Presenters will discuss a pilot study recently launched by Merit in the eastern Upper Peninsula of Michigan to demonstrate proof of concept and explore correlations between network performance and educational outcomes.

Breakout 2 - Michigan Elections Lab: People, Process, and Technology Makes Our Elections Secure
Andy Brush

Michigan Cyber Partners Program Manager | State of Michigan, DTMB/MCS

Lori Bourbonais

Michigan Secretary of State | Bureau of Election

Read Abstract

The Michigan Bureau of Elections and Michigan DTMB teamed up with local election officials from across the state to develop the Michigan Elections Lab to help local clerks explain how election security works. The lab details the multiple steps involved in running an election, including pre-election work of voter registration, ballot and tabulator programming, accuracy testing, and post-election audits. Each step describes the people, processes, and cross-checks that make our elections secure. Join us for a walk-through of the elections lab and ask your election security officials questions.

Breakout 3 - Smarter Screen Strategies: Technology and Mental Health
Katherine T. Cost, Ph.D.

Researcher | The Hospital for Sick Children

Read Abstract

From the introduction of television in the mid-20th century to the introduction of the iPhone in 2007, screens have become increasingly powerful, portable, and prevalent. But screen technologies are often designed to keep us engaged as long as possible. Although immediate access to virtual social networks can provide social support, strengthen relationships, and increase feelings of connectedness, screens can also have negative impacts on our mental well-being. Attendees will get an overview of the current state of research on screens and mental health, and hear practical strategies on how to use screens to support healthy development.

Sponsor Presentation: AmeriNet - Palo Alto Networks SOC: How We Defend against over 1 Trillion Security Events
Bruce Hembree

Field CTO & Technical Director | Cortex Palo Alto Networks

Read Abstract

Join us as we explore the Palo Alto Networks' Security Operations Center. The session will look at operations, daily threat statistics, and how the security company defends itself against over 1 trillion security events per month from the most advanced threat actors on the planet.

Sponsor Presentation: TelNet Worldwide - The Journey from On-Premise to UCaaS
Mark Iannuzzi

TelNet Worldwide, Inc

Bill Fisher

Consultant | Ferris State University

Dennis Bannon

Director of Technology | NE Michigan Community Mental Health

Jason Lepper

System Administrator | NE Michigan Community Mental Health

Pradip Patel

Director - Data Engineering | University of Michigan

Read Abstract

Communication is at the heart of every organization. Today’s organizations must navigate a plethora of workplace changes, faster pace of new technology and shifting telecom infrastructure.

Cloud-based systems and UCaaS platforms give leaders new opportunities to match today’s modern workforce and demands with more inclusive, flexible and scalable solutions that build momentum for the future.

Merit members share their journey to modernize their workplace communication technology and how they are migrating their communications to platforms that will support their team as they evolve.

11:45 A.M. - 12:15 P.M. | Lunch
12:20 P.M. - 1:05 P.M. | Lunchtime Keynote:
Quantumania: A Tutorial on the Concept of Quantum
Robert Johnson

President & CEO | Cimcor, Inc.

Read Abstract

Quantum has the potential to change our world significantly. This presentation will serve as an introduction to two emerging technologies: quantum computing and quantum communications. You will learn some fundamental concepts regarding quantum, how quantum computers work, why quantum communication is important, and some of the amazing problems we may one day solve by leveraging quantum. We will also explore the dark side of quantum computing and its potential impact on national security.

1:15 P.M. - 2:00 P.M. | Session 3
Breakout 1 - Transitioning On-Premise Telephony to the Cloud: A University of Michigan Technical Case Study
Pradip Patel

Director - Engineering | University of Michigan

Read Abstract

This session will explore the challenges and benefits of transitioning to cloud-based telephony in (Hybrid work environment) a higher-education setting by reviewing the experience of the University of Michigan. It will also include a discussion on 5G private cellular infrastructure and the added value of a private LTE/neutral host network in today's hybrid environment.

Breakout 2 - MI Connected Future: Creating a More Digitally Equitable Michigan
Eric Frederick

Chief Connectivity Officer | Michigan High-Speed Internet Office
State of Michigan | Dept. of Labor & Economic Opportunity

Jess Randall

Data/Policy Program Manager | State of Michigan, High Speed Internet Office

Ben Fineman

Federal Program Officer | Michigan U.S. Department of Commerce, NTIA

Read Abstract

The Michigan High-Speed Internet Office (MIHI) is working to implement programs from the Bipartisan Infrastructure Law that are designed to expand high-speed internet service to every home, business, and institution in the state and encourage Michiganders to adopt it, as well as address other challenges of the digital divide. Join the MIHI Office and staff from the National Telecommunications and Information Administration to hear about these programs and how you can be part of the efforts to connect every Michigan resident and community.

Breakout 3 - Merit Security Operations Center: Monitoring Your Network for Threats
Kevin Hayes

CISSP, CISM, Chief Information Security Officer | Merit Network

David Sullivan

Cyber Security Engineer | Merit Network

Read Abstract

As a statewide research and education network, Merit has a unique vantage point to watch for cyber threats against our members. By combining this capability with advanced automation, intelligence, and the skills of our Information Security team, we are creating a Security Operations Center (SOC) that will allow you to identify, respond to, and block threats like never before. Join us as we share a sneak peek of this new service, focused on providing effective alerting, cyber intelligence, and community-building in a way that every organization — from libraries to universities — can take advantage of.

Sponsor Presentation: EX2 Technology - Innovation and Best Practices for the Design and Build of Broadband Networks for Public, Private Partnerships
Jeff Parris

SVP, Sales | eX² Technology

Chance Eiker

Director of Operations | eX² Technology

Read Abstract

This session will discuss key frameworks and practical approaches on how public and private leaders successfully manage the 3C’s (contemplation, collaboration and construction) of a P3 broadband network deployment in understandable terms. During this session, the speakers will present best-in-industry thoughts on how to contemplate, collaborate and construct fiber broadband infrastructure within your communities, starting with an explanation of different P3 models and how to select the best model for your goals. Successful P3 work when private operators mutually benefit along with the public entity. This session will explore why it’s important for public leaders to understand key business drivers of private broadband operators and how they tend to think about their business models. Finally, the best laid plans fall short if constructability isn’t considered. You will learn about the diverse ways to manage and build out infrastructure and leave prepared to take advantage of this once-in-a-generation funding opportunity.

Sponsor Presentation: Akamai - Data Science: The Foundation for Contemporary Threat Intelligences
Douglas Holland

Senior Solutions Engineer | Akamai Technologies

Read Abstract

In the security world, data science means using algorithms to reveal malicious activity in near real-time by processing massive volumes of data. Contemporary internet threats are sophisticated and adaptable, continuously changing their complexion to evade security defenses. At the same time, security researchers are discovering some sources of security data are either unavailable or opaque due to encryption and the need to ensure personally identifiable information (PII) is always properly protected. This session explores the current threat landscape and how security researchers use DNS threat data to discover new phishing domains, predict the creation of DGA domains used in command and control infrastructure, and spot patterns of DNS data exfiltration. It also will explain why DNS resolution data is a rich resource for security research and discuss improvements in threat coverage, accuracy, and responsiveness.

2:15 P.M. - 3:00 P.M. | Session 4
Breakout 1 - Trust Yourself, Trust Your Power: The Superpowers of Mental Health & Neurodivergence Are Real (and Misunderstood)
Sharon Blady, Ph.D.

Founder & CFG (Chief Fan Grrrl) | SpeakUP

Read Abstract

Boldly go where not enough organizations have gone before: innovative inclusive learning and working environments that understand and empower the Superheroes in their midst! Discover a unique strengths-based perspective that shatters the myths and stigma around mental health and neurodivergence. With Avengers and X-Men, gain insight and evidence-based tools for engagement and empowerment that benefit everyone in your organization. Get ready to make real change, shake up the status quo, and have fun too!

Breakout 2 - How to Prepare For Upcoming Broadband Grants
Liz Shay

Senior Grants Development Consultant, Grants Office

Chris Greene Hutchings

Program Manager, Michigan Moonshot

Read Abstract

Over $1 billion in federal and state grants to expand broadband access in Michigan will be available in the coming 18 months. These funds come from different programs with differing requirements and processes. Fortunately, best practices to prepare your submission are the same for nearly all broadband grants. Join Liz Shay from Grants Office LLC and Chris Greene Hutchings from the Michigan Moonshot to learn how to plan and build a competitive grant proposal.

Gold Sponsor Presentation: Lit Communities - Building P3 Partnerships that Drive Impact: Livingston County, Lit Communities and Ex2
Brian Snider

CEO & Founder | Lit Communities

Kristoffer Tobbe

CIO | Livingston County

Read Abstract

The structure of your public-private partnerships (“P3”) will make all the difference in the short- and long-term success of a community network initiative. There is no one-size-fits-all solution, just as no one community is the same as the next. The ultimate success of any P3 arrangement comes down to the right balance of risk and control between the public and private entities. How do you get started, and what does it mean to build a truly community-minded P3 partnership? Kristoffer Tobbe, CIO of Livingston County, and Brian Snider, CEO of Lit Communities, will discuss their most recent P3 agreement, the journeys that brought them to this point, and the pathway forward as they work to connect all Livingston County residents.

Sponsor Presentation: PFN - NG911: Maximizing Technology to Ensure Campus Safety
Jason Bordeaux

Director of Sales | PFN - Peninsula Fiber Network

Jay Robison

National Channel Manager | 911inform

Read Abstract

Taking Security for Education and the Enterprise to the Next Level with PFN and 911inform

Tragedies are reported in the news daily, and institutions throughout the US are searching for a better way to be prepared for emergencies of all kinds. The PFN and 911inform teams will provide an opportunity to learn and see via a live demo:

  • 911 compliance and laws
  • How to gain visibility to cellular 911 calls instantly
  • Effectively using safety technology during an emergency
  • How to bring silo-ed technology into a more usable common platform
  • Providing access to this technology for public safety during an emergency
Sponsor Presentation: RF Connect - Breaking the Digital Divide Cycle with Private Wireless Networks
Jeff Hipchen

EVP | RF Connect

Read Abstract

The impact of the digital divide on education is significant because broadband access is vital to ensure that all students have the same opportunities to learn and succeed. The uncomfortable truth is decades of funding initiatives have failed to significantly narrow — much less bridge — the divide the divide. That’s primarily attributed to the fact that learning institutions must make tradeoffs when it comes to connectivity and because they are simply at the mercy of service providers. The next wave of connectivity no longer belongs to internet providers or cellular carriers but instead to schools. Recent innovations empower nearly any organization to use carrier-grade cellular spectrum to build a private wireless network without the prohibitive costs of owning or licensing the spectrum. More importantly, schools can for the first time control their broadband destiny so that all students have equal access to digital technologies.

3:15 P.M. - 3:40 P.M. | State of Merit
3:45 P.M. - 4:30 P.M. | Afternoon Keynote
Inpathy: A Social Media Mission Supporting Mental Wellness and The Human Experience
Kathryn Smith Pierre

Co-founder & COO | Inpathy

Read Abstract

Guided by a focus on the future of responsible tech and evidence-based interventions, presenter Kathryn Smith Pierre will share insights based on Inpathy’s research and her work as a mental health professional over the past decade in the US and Asia. Participants will have the opportunity to engage in discussion pertaining to social media use during a global mental health crisis, including social media’s risks and rewards; creating healthy digital identities; pedagogical strategies; and advocacy and activism through storytelling.

4:30 - 4:55 P.M. | Closing Comments
5:00 - 6:30 P.M. | Cocktail Reception
Cocktail Reception: Sponsored By Lit Communities
Read Abstract

Join us for an afternoon of networking and connection, presented by our MMC Gold Sponsor, Lit Communities. Try the Andorian Ale or a favorite libation, paired with the opportunity to expand your professional network, forge new partnerships, and strengthen existing ones. Engage with our Merit community and boldly network like never before!

Day #2 - May 17, 2023
8:35 A.M. - 8:55 A.M. | MMC Day 2 Welcome
MMC Day 2 Welcome
8:55 A.M. - 9:10 A.M. | MMC 2023 Gold Sponsor Introduction
Who We Are: A Brief Introduction to Lit Communities
Read Abstract

We do things differently. We partner with municipalities to build fiber networks in a way that keeps your community’s needs front and center every step of the way. Our community assessments are comprehensive and specific, so you have a clear plan forward to a sustainable fiber network. We don’t manage your network from some faraway city. We build and operate an ISP in your community to employ your residents and guarantee excellent service, and invite community-oriented companies to bring you telehealth services, smart city applications, and other modern solutions over the network we build.

9:15 A.M. - 10:00 A.M. | Morning Keynote
Achieving Digital Equity in Michigan with Federal Funding
Ben Fineman

Federal Program Officer | Michigan U.S. Department of Commerce, NTIA

Read Abstract

Many Michigan residents are challenged not only by the lack of universal high-speed internet infrastructure, but also by the lack of digital inclusion resources to access and use the infrastructure that is already available. In the coming months and years we will be seeing once in a generation federal investment in Michigan to address these issues, but successful implementation will require collaboration between a diverse group of stakeholders. In this session, we will dive more deeply into digital equity enablement, upcoming federal funding opportunities including the Broadband, Equity, Access, and Deployment Program (BEAD) and the Digital Equity Act (DEA), and how community anchor institutions can participate in this critical work.

10:10 A.M. - 10:55 A.M. | Session 1
Breakout 1 - Project MOON-Light: Merit’s Statewide Foundation for Digital Infrastructure
Delle Clair

Network Operations Performance Manager | Merit Network

Michael Milliken

Vice President for Network Technology and Innovation | Merit Network

Wade Wulster

Account Manager, Enterprise | Adva/AdTran

Keith Castelino

System Consultant | Adva/AdTran

Read Abstract

Project MOON-Light: Merit's Statewide Foundation for Digital Infrastructure

Learn about Merit's new Project MOON-Light (Michigan Open Optical Network-Leveraging Innovation to Get High-Speed Technology for all), which aims to make our state the best connected in the nation. One of the first next-generation infrastructure projects of its kind in the country, MOON-Light solves the middle-mile problem where communities have few or no options in connecting their local last-mile networks to the greater internet. The statewide infrastructure upgrade will allow Merit to collaborate with community and private providers on last-mile network expansions. Services are set to begin in fall, helping to deliver affordable broadband network access, enhance quality of life, and provide equitable opportunities for all. In this session, teams from Merit and fiber networking company Adtran will outline how using an "all-coherent" architecture supported by advanced tooling systems supports this project.

Breakout 2 - Better than Phishing: Dropping USB Drives to Test Your Employees
Kevin Hayes

CISSP, CISM, Chief Information Security Officer | Merit Network

Aaron Eleby

Cyber Security Analyst | Merit Network

Read Abstract

Ensuring that our users follow our cybersecurity guidance is something that never ends. But how do we measure if our training and efforts are doing anything? By testing, of course! Merit's cybersecurity program has evolved to the point where performing more advanced testing, such as placing lost "malicious" USB drives around the office, is required to keep attention high and potential threats away. In this session, you will learn how to ensure your organization is ready for such testing, how to design an effective USB drop campaign, how to execute the test while retaining support and engagement, and how to report and communicate your results to leadership and staff.

Breakout 3 - Owning Our Digital Future: Beaver Island's Experience and Plan
Kevin Boyle

Chair | Beaver Island Townships Joint Telecommunications Advisory Committee

Dick Mulvihill

President | Beaver Island Association

Read Abstract

For too long small communities have had their digital future tied to the whims of profit-seeking companies that receive federal and other public funding to build inadequate, out-of-date broadband infrastructure. It's time to change that. Beaver Island is working to make that change by exploring opportunities for it to be a partner and have a voice in next-generation telecom infrastructure. What we need to be competitive may not be commercially viable, so we are exploring ways to close that gap while making sure our tax dollars are used to fund systems we control. Attendees will learn about our efforts and the processes we have used on the island to close the services gap, including our community-built interim system and our plans to drive funding to support a community system.

Sponsor Presentation: People Driven Technology - Chartering Your Disaster-Recovery Future Based on the Actions of Bad Actors
Daniel Heidt

VP of Hybrid Cloud | People Driven Technology

Read Abstract

In this session, we will discuss "bad actor" tactics and their methodologies as it pertains to cyber defense and recovery. Participants will learn from examples of successful and failed results. We'll take a deep dive into architectures that can improve cybersecurity posture and recoverability. The right knowledge empowers you to build a better defense. Follow-up sessions will be made available to continue the discussion and address attendees' particular needs and concerns.

Sponsor Presentation: F5 - Boldly Make Application Security Easy
Tony Hays

Solutions Engineer | F5

Josh Brooks

Solutions Architect | WorldTech IT

Read Abstract

Supercharge your security, thwart bot attacks, and protect your apps with intelligence — without lifting a finger — thanks to F5 + WorldTech IT. Our expert engineers are here to support our bold claims and demonstrate our tech. Attendees will experience the difference when working with F5 Distributed Cloud and WorldTech IT, see a live demonstration of our Web App & API Protection, and learn how to extend their security team’s efficiency with App Infrastructure Protection. The presentation will conclude with a question-and-answer session that will answer any bold security questions or security pain points you may have.

11:10 A.M. - 11:55 A.M. | Session 2
Breakout 1 - My Students are Smarter than Your Security
Keith Nabozny

Professor of Information Technology | Macomb Community College

Paige Barnes

Information Systems Security Analyst | Macomb Community College

Read Abstract

In 2016, our community college created a project for advanced cybersecurity students to conduct a vulnerability analysis of the college to gain real-world experience. The project has been so successful that their vulnerability analysis reports have become part of the college’s regular internal security studies and documentation. The project has provided students with valuable hands-on experience with the tools and techniques used to identify vulnerabilities. They report those findings back to the customer in a written report and group presentation. The analysis covers areas such as internal and external scans, physical security, and social engineering. Students conduct the analysis with guidance from the instructor and the security department, but the students perform all the work themselves, including writing the report and presenting their findings.

Breakout 2 - What to Expect When You Shoot For the Moon
Chris Greene Hutchings

Program Manager | Michigan Moonshot

Paul Sachs

Director of Strategic Impact | Ottawa County

Lucy Blair

Communications Director | Calhoun County

Gregg Todd

County Controller/Administrator | Ingham County

Read Abstract

This session will help attendees understand the Michigan Moonshot from Michigan communities that have been through the process. Key topics include data collection, validating availability of service, and how to use this information to help your community broadband plan Boldly Go!

Breakout 3 - Open Access vs. "Open Access” - Control Your Own Destiny
Bruce Patterson

Head of Operations | EntryPoint Networks

Read Abstract

COVID-19 moved essential day-to-day interactions online, and those without reliable, high-speed access are being left behind. As broadband shifted from an amenity to a necessity, Detroit adopted a bold and sweeping plan capable of closing the gaps by improving access and affordability. What motivated Detroit leadership to adopt such a plan? How does the plan demonstrate a nuanced understanding of the complex issues associated with digital equity? What risks does the City face as it advances its agenda and what lessons can other communities take away from Detroit’s experience? These questions and more will be considered in an in-depth consideration of the Detroit plan with audience discussion.

Sponsor Presentation: Presidio - Demystifying Zero Trust
Michael Lane

Senior Solutions Architect | Presidio

Jeremy Hile-Hoffer

Solution Engineer | Netskope

Read Abstract

Zero Trust has become an overused marketing term in the security industry, but it doesn’t mean its without value. In our discussion we will give an overview of how you can find out what Zero Trust means to your organization and how Presidio and Netskope can facilitate your journey toward a Zero Trust Architecture. You’ll walk away with a better understanding of how Zero Trust is more than a buzzword and can help your organization achieve a higher security posture.

Sponsor Presentation: World Wide Technology - Bold Journeys Need Maps, Safe Passage, and a Crew
Michael Sink

Chief Technology Advisor - Higher Education | World Wide Technology

Read Abstract

IT organizations need to chart an appropriate course to deliver valuable outcomes through innovative, reliable, and secure digital solutions. At the same time, they must address the challenges in obtaining and retaining the skills to effectively and efficiently make the journey. Drawing from his experience in higher education and consulting, Michael Sink will discuss the importance of a comprehensive approach to digital service delivery. This includes navigating the functional and technical ecosystem, addressing security risks, and seeking flexible ways to acquire the appropriate skills.

11:55 A.M. - 12:45 P.M. | Lunch
12:45 P.M. - 1:00 P.M. | Passport Prize Giveaway and End of Day Remarks
1:15 P.M. - 2:15 P.M. | Workshop Part 1
Workshop 1: Part 1 - Merit Security Workshop: What's In YOUR Network?
Kevin Hayes

CISSP, CISM, Chief Information Security Officer | Merit Network

Bryan Robinson

Cyber Security Engineer | Merit Network

Read Abstract

For us to be effective in cybersecurity, not only do we need to protect the easy things we know about, but also the difficult or hidden network devices which we are forced to support. Consumer, personal, and IoT devices pose a particular challenge, as we must learn to not only discover these devices on our network, but understand them, take ownership of their consequences, and build an effective security program around their use. Attackers will always succeed by compromising the weakest link in your cyber chain, and for far too long we have just characterized these unmanaged endpoints as not being worthy of our concern. This stops now!

In this introductory session on device discovery and management, attendees will learn how to gain a full understanding of the network devices they support (whether they like it or not) and how to apply cybersecurity concepts properly to these IoT and consumer products that refuse to be managed by normal means.

Workshop 2: Part 1 - Furthering Broadband Deployment: Creative Applications of GIS in Communities
Amy Stuyvesant, GISP

Senior Business Systems GIS and Data Analyst | Merit Network

Tim Lauxmann

Geodata Manager | DTMB/Center for Shared Solutions

Read Abstract

This three-hour workshop will walk you through creative applications of graphical information systems (GIS) for community connectivity. Unlock the power of GIS by learning from industry experts and network operators. Don't currently have GIS capabilities in your municipality or organization? Participants will learn about basic GIS resources used in broadband expansion initiatives, presented with GIS use cases and demonstrations.

Workshop 3: Part 1 - Digital Equity and Inclusion: Strategy, Planning, and Measurement
Pierrette Dagg

Director of Technology Impact Research | Merit Network
Research Associate, Quello Center for Media and Information Policy | Michigan State University

Read Abstract

This session will introduce the Digital Opportunities Compass framework that can be used to guide state and local digital inclusion planning at a moment of unprecedented investment in broadband infrastructure and digital equity. The framework was developed in partnership with researchers at Merit, the Quello Center at MSU, the Digital Equity Research Center, and the National Digital Inclusion Alliance. As communities and states develop plans to improve digital equity, it is important to establish a shared framework to set goals and priorities, identify opportunities, and monitor progress toward these goals. The Digital Opportunities Compass can be used to gain a holistic picture of digital equity in a community, identify key factors that influence outcomes, and support planning and strategy development.

2:30 P.M. - 3:30 P.M. | Workshop Part 2
Workshop 1: Part 2 - Merit Security Workshop: What's In YOUR Network?
Kevin Hayes

CISSP, CISM, Chief Information Security Officer | Merit Network

Bryan Robinson

Cyber Security Engineer | Merit Network

Read Abstract

Security Workshop continued

Workshop 2: Part 2 - Furthering Broadband Deployment: Creative Applications of GIS in Communities
Amy Stuyvesant, GISP

Senior Business Systems GIS and Data Analyst | Merit Network

Mark Holmes

CSS Geospatial Services Manager | DTMB - Community broadband expansion through GIS

Read Abstract

GIS Workshop continued

Workshop 3: Part 2 - Digital Equity and Inclusion: Strategy, Planning, and Measurement
Pierrette Dagg

Director of Technology Impact Research | Merit Network
Research Associate, Quello Center for Media and Information Policy | Michigan State University

Read Abstract

Research Workshop continued

GOLD MERIT MEMBER CONFERENCE SPONSOR

MERIT COMMUNITY SUPPORTERS

Juniper Networks

MERIT MEMBER CONFERENCE SPONSORS

SILVER SPONSOR

Amerinet

BRONZE SPONSOR

BASIC SPONSOR

PAST MERIT MEMBER CONFERENCES

Merit Member Conference 2022

At MMC 2022, we explore the possibilities that lie in cultivating these environments and in redefining ourselves to thrive in a dynamically shifting future.

Learn More

Merit Member Conference 2022

At MMC 2022, we explore the possibilities that lie in cultivating these environments and in redefining ourselves to thrive in a dynamically shifting future.

Learn More

Merit Member Conference 2021

This last year has illustrated that our organizations can thrive outside of a single, clustered point of operation. As we embrace a new network of communication tools, processes, and team dynamics, we need balance.

Learn More

Merit Member Conference 2021

This last year has illustrated that our organizations can thrive outside of a single, clustered point of operation. As we embrace a new network of communication tools, processes, and team dynamics, we need balance.

Learn More

Merit Member Conference 2020

This year, we will be hosting an entirely virtual Merit Member Conference and Broadband Summit. We will retain and embrace the theme of Going Beyond – this is our opportunity to reimagine and explore member collaboration and interactivity like we’ve never had before!

Learn More

Merit Member Conference 2020

This year, we will be hosting an entirely virtual Merit Member Conference and Broadband Summit. We will retain and embrace the theme of Going Beyond – this is our opportunity to reimagine and explore member collaboration and interactivity like we’ve never had before!

Learn More

You need to login to contact with the Listing Owner. Click Here to log in.