skip to Main Content

MERIT MEMBER CONFERENCE 2022

The transformative workplace demands flexibility and innovation. From the hybrid workplace to new challenges in information security, supply chains, talent development and attraction, network automation, organizational culture, digital connectivity, inter-institutional collaboration and more, opportunities exist to re-engineer our approaches to take strategic advantage of this new landscape.

At MMC 2022, we explore the possibilities that lie in cultivating these environments and in redefining ourselves to thrive in a dynamically shifting future.

DATES:

Tuesday, May 10th – Wednesday, May 11th, 2022

LOCATION:

THE HENRY, DEARBORN, MI

REGISTRATION IS CLOSED FOR MMC 2022

Day #1 - May 10, 2022
8:00 - 8:30 A.M. | Breakfast and Registration
8:35 A.M. - 8:55 A.M. | Opening Remarks
Opening Remarks
Joe Sawasky

President and CEO | Merit Network

Pierrette Dagg

Director of Marketing and Communications | Merit Network

9:00 A.M. - 9:45 A.M. | Morning Keynote
Election Cybersecurity in the Age of Disinformation
J. Alex Halderman

Professor, Computer Science and Engineering, Director, Center for Computer Security and Society | University of Michigan

Read Abstract

In the aftermath of the 2020 Presidential contest, election security faces new challenges. Many voters' confidence has been undermined by baseless conspiracy theories. At the same time, elections must defend against real threats from nation-state attackers, and without further action by Congress and the states, voting will continue to be vulnerable both to real attacks and to false accusations of fraud. In this talk, I’ll explain how technology can help counter these risks and restore confidence by placing elections on a science-and-evidence based footing. It is essential that voters be accurately informed about real election security risks and defenses, both to counter disinformation and to ensure that there is public support for badly needed reforms.

10:00 A.M. - 10:45 A.M. | Session 1
Breakout 1 - Getting Grants Ready for IIJA Broadband Funding
Chris Barnes

Senior Grants Development Consultant | Grants Office LLC

Read Abstract

The $65 billion in broadband funding from the Infrastructure Investment and Jobs Act (IIJA) presents a once-in-a-lifetime opportunity for governments and other organizations to expand connectivity to their communities and bridge the digital divide. But as these new grant programs open, the competition will be fierce, and it’s crucial to put together a compelling, competitive proposal to optimize your chance to win funding. However, knowing what can increase your likelihood of winning funding can sometimes be difficult to determine. What kind of data needs to be collected to demonstrate need in your community? Who are the stakeholders you need to engage?

In this presentation, Chris Barnes from Grants Office, LLC will discuss the new IIJA broadband funding and cover the best practices for putting together a proposal. Whether you’re looking to fund a project around broadband infrastructure or digital equity, this session will arm you with strategies to make your proposal stand out from the rest.

Breakout 2 - How You Can Benefit From the Internet2 Automation Journey
Karl Newell

Network Software Architect | Internet2

Read Abstract

Join Karl Newell, the Network Software Architect with Internet2 for a two-part presentation. First, explore how Internet2 developed a network automation and orchestration framework based around Cisco Network Services Orchestrator (NSO) to deploy a Next Generation Infrastructure (NGI) and migrate services to NGI. Following will be a discussion on how this impacts the development of future services and how his team is building tools for self-provisioning and monitoring of services for their community.

Breakout 3 - Sponsor Presentation: Tales from the Trenches - Unit 42
Don Tedrow

Security Architect for Unit 42 | Palo Alto Networks

John Wood

Director, Unit 42 | Palo Alto Networks

Read Abstract

In 2021, more than 2,500 organizations were named by ransomware groups as victims of ransomware attacks. These organizations spanned the globe and impacted nearly every industry. Ransomware continues to be a top cybersecurity priority for the education sector. Being prepared for these attacks starts with understanding them. In this presentation, our experts John Wood (retired FBI Agent) & Don Tedrow, from Palo Alto Networks Unit 42 will deep dive on several recent investigations, including education examples, as well as provide insights into ransomware trends from the 2022 Unit 42 Ransomware Threat Report.

11:00 A.M. - 11:45 A.M. | Session 2
Breakout 1 - HR and Artificial Intelligence - Point and Counterpoint
Teri Abbo, MPA CTPE

Director, IT Services Alliance | Oakland University

Pierrette Dagg

Director of Marketing and Communications | Merit Network

Read Abstract

It has been hypothesized that the HR and middle-management functions within many organizations will be significantly reduced or replaced by AI within the next 20 years. Positive implications, such as organizational efficiency, the reduction of error, productivity, and solutions for training and re-skilling must be weighed against challenges like data rights, cybersecurity, the shepherding of workplace culture and the dehumanization of administration. What considerations should be top of mind now, for any nonprofit or higher education organization, in light of the coming changes to the HR and management landscape?

Breakout 2 - Getting Started on Your Broadband Journey
Ben Fineman

President | Michigan Broadband Alliance

Gary Munce

Board Member | Michigan Broadband Alliance

Read Abstract

One of the biggest challenges for any community looking to address Internet access is how to get started. The future we want to build is clear, but where are the blueprints? The Michigan Moonshot offers two consulting programs to guide communities from start to finish. Consulting with Michigan Broadband Jumpstart can help community broadband initiatives to get started by establishing firm foundations for a successful community network. Established broadband task forces engineer their community's future with Pathfinder consultants that help set goals, collect data, determine the right path, secure funding, and implement a solution to expand Internet access.

Breakout 3 - Merit Community Supporter - Cisco:
Talos- Cisco Threat Intelligence and Incident Response
Matt Aubert

Senior Manager | Cisco Talos

Read Abstract

Threat Intelligence might be the most important part of your Cyber Defenses and Incident Response planning. Matt Aubert, Senior Manager Cisco Talos, will share how the Talos organization researches threats, the visibility they have into the global threat landscape and highlight how world events have affected the cyber threat landscape. Matt will also highlight the proactive side of Incident Response and the effect that could have on Cyber Insurance.

11:45 A.M. - 12:15 P.M. | Lunch
12:20 P.M. - 1:05 P.M. | Lunchtime Keynote
Our Rude Awakening and Moment of Clarity
Doug McCoullough

Chief Information Officer | City of Dublin, Ohio

Read Abstract

We are experiencing clarity and it hurts. Realities about connectivity, automation, inequity, and the future of communities were veiled behind self-imposed blinders that were ripped off by the pandemic. With new clearer vision we have an historic opportunity to establish new connectivity infrastructures, new models of public planning and administration, and new ways to organize talent, community well-being, and prosperity.

1:15 P.M. - 2:00 P.M. | Session 3
Breakout 1 - Public Libraries Post-Pandemic: A Changing Role
Rebecca Stanwick

Assistant Manager | Fact and Fiction Department
Librarian, The Steinem Sisters Collection | Toledo Lucas County Public Library

Read Abstract

When COVID-19 stopped the word, public libraries kept going, staying open and serving our communities during the worst of the worst - often filling in for other shuttered service providers. In this presentation, we will discuss what we have learned as public servants and how a possible path forward might take shape. These lessons provide relevant building blocks and considerations for libraries, municipalities and other community anchor institutions that will serve our citizens in the future.

Breakout 2 - YooperCon ’21: An Algorithm for CS and Cyber K-12 Engagement
Douglas Miller

Director | Upper Peninsula Cybersecurity Institute

Read Abstract

Providing cybersecurity and computer science career awareness and education for rural K12 students is a challenge for many reasons. The Upper Peninsula Cybersecurity Institute (UPCI) at Northern Michigan University partners with multiple organizations to host an annual event to provide Upper Peninsula students opportunities to explore these topics. YooperCon is designed to engage regional high school students in short, hands-on, fun activities centered on computer science and cybersecurity. In this talk, UPCI Director Doug Miller will discuss the planning, individual activities, and lessons learned from the most recent YooperCon event in November 2021. Attendees will walk away with a planning template and insight on how to incorporate a YooperCon event into their K-12 ecosystem.

Breakout 3 - Sponsor Presentation: How to Prepare, Manage and Respond to Cyber Emergencies
Dan Lohrmann

Field CISO – Public Sector | Presidio

Read Abstract

There has a dramatic increase in major cybersecurity incidents affecting large, medium and small organizations in the public and private sectors over the past few years. From ransomware to data breaches, these disruptive incidents have raised the stakes for technology and security leaders.

Dan will talk about these trends, including true stories, from his new book: Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering From Inevitable Business Disruption.

Topics covered will include:

  • What are the causes for the literal weekly cyber emergencies we hear about on the news? It's alarming!
  • What action steps can government leaders take to prepare before, during and after cyber emergencies?
  • What were some lessons Dan has learned from his own personal experiences?
2:15 P.M. - 3:00 P.M. | Session 4
Breakout 1 - Merit Support Systems Evolution
David Dennis

Chief Information Officer | Merit Network

Michael Milliken

Vice President for Network Technology and Innovation | Merit Network

Delle Clair

Senior Business Systems Project Manager | Merit Network

Read Abstract

Merit has begun the process of modernizing its ticketing, monitoring, and overall support systems to better serve the community. Network automation efforts are also underway to improve the speed and quality of your services. This session will include a demonstration of new capabilities, discussion of future enhancements, and discussion with attendees on how to make your Merit support experience even more positive.

Breakout 2 - Threat Landscape Fireside Chat with City of Detroit CIO & University of Michigan CISO
Zack Faase

Regional Sales Manager for SLED accounts in Michigan | CrowdStrike

Art Thompson

Chief Information Officer | City of Detroit

Sol Bermann

Chief Information Security Officer | University of Michigan

Deborah Blyth

Executive Strategist | CrowdStrike, Former CISO State of Colorado

Read Abstract

The cyber threat landscape is rapidly evolving and state and local governments and higher education institutions have become popular targets. This facilitated fireside chat from CrowdStrike should give you great insights from security leaders from City of Detroit and the University of Michigan about the steps they're taking to help protect their organizations.

Breakout 3 - Sponsor Presentation: Foundational Security – What It Takes to Build a Strong Security Program
Brian Gawne, CISSP, CISA, CISM

Vice President, Security & Compliance | Access Interactive

Read Abstract

The key to a strong security program is its foundational components. Just as we build houses the order in which we stack the components of a cyber security program will impact the success. What building blocks are missing from your security program?

A strong cyber security program is key to protecting corporate assets and the organization itself. Understanding all the cyber security building blocks which are necessary and the impact they can have on your program is important. In this session we will discuss the most common building blocks, how they make an impact, why they are important and how the information they provide can help guide your security program while ensuring that the security program aligns with business goals, client expectations, and local, state, or federal regulations.

3:15 P.M. - 3:35 P.M. | State of Merit - Joe Sawasky, President and CEO | Merit Network
3:40 P.M. - 4:25 P.M. | Afternoon Keynote
Solving the Connectivity Crisis: Inspiration from Other Places
Susan Crawford

John A. Reilly Clinical Professor of Law | Harvard Law School

Read Abstract

The COVID crisis revealed how important world-class, cheap, and ubiquitous internet access is. Substantial federal funding will soon be deployed in Michigan aimed at ensuring this access exists. But there is no guarantee this money will be well-spent. What can we learn from leaders in the US and around the world about what has to happen in order to make sure everyone has the access needed to thrive in the modern world? This talk will focus on best practices and key insights drawn from other places.

4:25 P.M. - 4:30 P.M. | Closing Comments
4:30 P.M. - 6:00 P.M. | Cocktail Reception
Broadband & Bourbon Fireside Chat
Francella Ochillo

Executive Director | Next Century Cities

Matthew Rantanen

Director of Technology | Southern California Tribal Chairmen's Association Tribal Digital Village

Chris Mitchell

Director | Community Broadband Networks Institute for Local Self-Reliance

Day #2 - May 11, 2022
8:35 A.M. - 8:55 A.M. | Merit Welcome Address
Merit Welcome Address
Pierrette Dagg

Director of Marketing and Communications | Merit Network

8:55 A.M. - 9:10 A.M. | MCWT Welcome Address
Introduction to the Michigan Council of Women in Technology Foundation (MCWT): Engaging and Retaining Female Professionals
Jill Maiorano

Managing Director-Strategic Healthcare Provider and Plans | Microsoft

Chris Rydzewski

Executive Director | Michigan Council of Women in Technology Foundation

Read Abstract

A diverse tech workforce is a vital part of Michigan’s transformation. MCWT is a local organization that can help provide a few actionable steps to help build the female tech talent pipeline.

9:15 A.M. - 10:00 A.M. | Morning Keynote
The Hybrid Mindset: Building Blocks for a Successful Hybrid Organizational Strategy
Stephanie Murphy

Leadership and Talent Strategy | ADVISA

Read Abstract

Remote and hybrid work isn’t a new concept but the last two years has sent the concept of Hybrid Strategy into hyper drive. From changing roles to shifting formats, teams must rethink their approach to recruiting, onboarding, collaboration and roles. So how do we thrive in the chaos and win in the unknown? In this talk, ADVISA Leadership Consultant Stephanie Murphy will discuss the mindset shift required for resilience and the five building blocks that will make your hybrid strategy successful over the long haul. Attendees will walk away with insight and prompts they can take back to their teams to ensure hybrid work success no matter what gets thrown their way.

10:10 A.M. - 10:55 A.M. | Session 1
Breakout 1 - Premiere Session of the Broadband Equity and Advocacy Community of Practice
Ben Fineman

President | Michigan Broadband Alliance

Charlotte Bewersdorff

Vice President for Community Engagement | Merit Network

Read Abstract

In this inaugural session of the Broadband Equity and Advocacy Community of Practice (COP), participants will connect with peers in other communities navigating the process of seeking reliable, high-speed Internet. The COP is engineered to foster learning and collaboration between peers representing municipal and county government entities, broadband stakeholders at Merit Member organizations, and Michigan nonprofits. This session is your opportunity to see what the COP is like before you decide to join.

Discussion areas include network ownership models, navigating federal funding, and infrastructure planning, build-outs, maintenance and operation.

Breakout 2 - Sponsor Presentation: Beyond the Perimeter- How to Centralize Security and Threat Protection Policies Using Zero-Trust Architecture
Keval Shah

Sales Engineer | Zscaler/WWT

Read Abstract

Zscaler and WWT are helping public sector organizations rethink their approach to centralizing security policies and enforcing user trust. During the presentation Zscaler and WWT will discuss the benefits of our Zero-Trust architecture for your organizations and constituents, including:

  • Zero Trust approach to application access: both Internet facing and Private Applications
  • Zero-day threat protection (SSL and Cloud Sandbox)
  • Data protection and student safety (DLP and CASB)
  • Compliance: CIPA, CMMC, Fedramp /Stateramp
  • K12 Cyberbullying Protection, and URL Filtering
Breakout 3 - Sponsor Presentation: On-Premise vs. Cloud Phone Systems: What are the Risks and Benefits?
Mark Iannuzzi

President | TelNet Worldwide

Read Abstract

Which is better, an on-premise phone system or cloud PBX? Good question! The world has changed a lot in the last few years and chances are your needs have changed too. And, they are likely to change more in the next few years. Understanding the systems better will help you figure out what will work best for you. Join our interactive session to understand the risks and benefits of both on-premise and cloud PBX systems.

What you need to know to make a good decision:

  1. Critical Factors in Building Solutions
  2. Types of PBX Systems
  3. Updates and Upkeep
  4. Reliability and Connectivity with Merit Voice
  5. Adaptability and Scalability
  6. Total Cost of Ownership
11:10 A.M. - 11:55 A.M. | Session 2
Breakout 1 - Tracking Cyber Threats Using Merit's ORION Network Telescope
Kevin Hayes

Chief Information Security Officer | Merit Network

Michalis Kallitsis, Ph. D.

Research Scientist | Merit Research

Read Abstract

Network telescopes collect and record unsolicited Internet-wide traffic destined to a routed but unused address space usually referred to as "Darknet" or "blackhole" address space. Darknets can provide a global perspective on Internet behavior and are one of the key data sources used by the networking and security communities to understand malware propagation, Distributed Denial of Service (DDoS) attacks, network scanning, routing misconfigurations, and Internet outages.

In this talk, we plan to present the ORION network telescope operated by researchers at Merit Network and the University of Michigan. Merit's network telescope has been in operation for more than 15 years and it is one of only few large network telescopes accessible to network researchers within the country. With support from the National Science Foundation, we have recently renewed our network telescope infrastructure and we plan to demonstrate to the Merit community how one can leverage this unique data infrastructure to identify nefarious activities within one's network, track the onset of new malware that perform Internet-wide scanning and detect instances of large-scale Denial of Service activities.

Breakout 2 - For the People: How a Public Utility Championed Community Broadband
Scott Menhart

Chief Information Technology Officer | City of Traverse City

Read Abstract

For more than 100 years, Traverse City Light & Power has provided reliable electricity for this northern Michigan town. So how did they get into the fiber broadband business? Chief Information Technology Officer Scott Menhart relates how TCLP's ongoing evolution of technology and services led toward broadband, and how a groundswell of public engagement paved the way to bring Gig fiber to the residents of Traverse City. Scott reviews the challenges faced as a new municipal broadband provider, lessons learned, and valuable partnerships formed along the way.

Breakout 3 - Merit Community Supporter - Juniper Networks: Network Evolution for 400G and Beyond
Robert Damon

Senior Consulting Engineer | Juniper Networks

Read Abstract

Join Juniper Networks for a discussion on the current trends in network architecture as operators prepare for higher speed services and how shifting traffic patterns are changing the way the networks are built. Robert Damon, Global Architect and 16-year Juniper veteran, will discuss how the influence from hyperscalers has changed product design and deployment. This will include a discussion on advancements in routing silicon, consolidation of routing protocols, and current plans for 400G deployments with preparations for 800G.

Breakout 4 - Sponsor Presentation: Simplify Your Network and Security Edge
Greg Kreiling

Fortinet Major Account Manager - SLED MI | Fortinet

Read Abstract

Join Fortinet for a discussion about how you can handle edge routing, DDoS prevention, SD-WAN, VPN, SSL Decryption, and a full security stack in one device. Eliminate complicated and disparate edge networking and security devices, reduce costs, reduce risk, and simplify management and operations.

11:55 A.M. - 12:25 P.M. | Lunch
12:30 P.M. - 1:15 P.M. | Lunchtime Keynote
Why Does Privacy Matter?
Neil Richards

Koch Distinguished Professor in Law | Washington University in St. Louis
Director | Cordell Institute for Policy in Medicine & Law

Read Abstract

Now more than ever, governments and corporations have the power to know what we do, where we do it, who we do it with, and oftentimes, what we want to do in the future. In this discussion, Washington University St. Louis law professor Neil Richards lays out exactly why privacy is so vitally important, drastically misunderstood, and not dead by any stretch of the imagination. In reality, the fight over privacy in the digital age is just beginning, and the results of that fight will determine what kind of society we’ll inhabit. As we build a blueprint for the future in our digital world, privacy will continue to be an essential part of that blueprint to preserve our important, hard-won, and fragile human values.

1:15 A.M. - 1:35 P.M. | Closing Remarks
Closing Remarks and Passport Drawing!
Kevin Hayes

Chief Information Security Officer | Merit Network

1:50 P.M. - 4:15 P.M. | Workshop
Cybersecurity Workshop - The Seven-Layer Cybersecurity Burrito
Kevin Hayes

Chief Information Security Officer | Merit Network

Read Abstract

Merit Chief Information Security Officer Kevin Hayes will lead this workshop that gives participants a detailed view of what a cyberattack looks like from the attacker's perspective, and shows how to protect your organization through seven simple layers of defense. Participants will come away with a clearer understanding of how attackers are operating in 2022, the typical lifecycle of an attack and what the different phases of attacks could look like to an organization’s IT staff. The workshop also will include examples of how layered defenses have helped protect against attacks, as well as where a lack of layers led to failure.

SEVEN-LAYER CYBERSECURITY BURRITO

May 11, 2022 at 1:30 – 4:00 P.M. EST

Merit Chief Information Security Officer Kevin Hayes will lead this workshop that gives participants a detailed view of what a cyberattack looks like from the attacker’s perspective, and shows how to protect your organization through seven simple layers of defense. Participants will come away with a clearer understanding of how attackers are operating in 2022, the typical lifecycle of an attack and what the different phases of attacks could look like to an organization’s IT staff. The workshop also will include examples of how layered defenses have helped protect against attacks, as well as where a lack of layers led to failure.

DON'T MISS OUR KEYNOTE SESSIONS

With in-person or streaming options, we offer members the opportunity to attend all of our plenary sessions this year – options are available on the registration page.

DAY 1 : TUES. MAY 10, 2022

MORNING KEYNOTE

J. ALEX HALDERMAN

Professor, Computer Science and Engineering
Director, Center for Computer Security and Society
University of Michigan

ELECTION CYBERSECURITY IN THE AGE OF DISINFORMATION

In the aftermath of the 2020 Presidential contest, election security faces new challenges. Many voters’ confidence has been undermined by baseless conspiracy theories. At the same time, elections must defend against real threats from nation-state attackers, and without further action by Congress and the states, voting will continue to be vulnerable both to real attacks and to false accusations of fraud. In this talk, I’ll explain how technology can help counter these risks and restore confidence by placing elections on a science-and-evidence based footing. It is essential that voters be accurately informed about real election security risks and defenses, both to counter disinformation and to ensure that there is public support for badly needed reforms.

Read Bio

J. Alex Halderman is Assistant Professor of Electrical Engineering and Computer Science at the University of Michigan. Halderman received his Ph.D. from Princeton in 2009 and conducts research in a wide range of security-related topics including software security, data privacy, electronic voting, anticensorship, digital rights management, and cybercrime. In particular he has published highly influential work in election security, and is widely known for his successful penetration attack against an Internet voting trial in Washington, D.C. in October, 2010 which established very dramatically the vulnerability of such systems. He also has published a security analysis of India’s electronic voting system which has prompted officials to a fundamental reconsideration of its architecture.

LUNCH KEYNOTE

DOUG McCOLLOUGH

Chief Information Officer
City of Dublin, Ohio

OUR RUDE AWAKENING AND MOMENT OF CLARITY

We are experiencing clarity and it hurts. Realities about connectivity, automation, inequity, and the future of communities were veiled behind self-imposed blinders that were ripped off by the pandemic. With a new clearer vision, we have a historic opportunity to establish new connectivity infrastructures, new models of public planning and administration, and new ways to organize talent, community well-being, and prosperity.

Read Bio

Doug McCollough has embraced the rich community of innovation that is Central Ohio and now serves as external CIO/CTO with the City of Dublin. Through collaborations and partnerships he has worked to connect people to opportunities, remove barriers, and promote change in initiatives ranging from Smart and Connected Cities, IT Workforce Development, expanding broadband access, Connected and Autonomous Vehicles, and Blockchain in Government. He has spoken as a Subject Matter Expert and advocate on technical subjects, diversity and inclusion, and using technology for community development and now serves as an advisor, consultant, and advocate for communities and organizations.

Prior to his current work, Doug held positions within the State of Ohio Departments of Public Safety, Commerce, Industrial Commission, and Medicaid. He served as the Director of Information Technology for the City of Richmond, Virginia, and as a Project Manager at Nationwide Insurance and Alcatel-Lucent. He is on the boards of Per Scholas Columbus, TECH CORPS, and Jewish Family Services of Columbus, is a cofounder of Black Tech Columbus, and a Trustee for the Central Ohio Transit Authority.

Doug earned a bachelors degree from the University of Toledo in Information Systems and Operations Management and a Master of Business Administration degree from the University of Notre Dame. He is a 2020 Champion for Women Award winner from EmpoWE-R Women of Information Security, 2019 Top Doers, Dreamers, and Drivers Honoree, and 2018 Ohio Public Sector CIO Academy Municipality CIO of the Year.

AFTERNOON KEYNOTE

SUSAN CRAWFORD

John A. Reilly Clinical Professor of Law
Harvard Law School

SOLVING THE CONNECTIVITY CRISIS: INSPIRATION FROM OTHER PLACES

The COVID crisis revealed how important world-class, cheap, and ubiquitous internet access is. Substantial federal funding will soon be deployed in Michigan aimed at ensuring this access exists. But there is no guarantee this money will be well-spent. What can we learn from leaders in the US and around the world about what has to happen in order to make sure everyone has the access needed to thrive in the modern world? This talk will focus on best practices and key insights drawn from other places.

Read Bio

Susan Crawford is the John A. Reilly Clinical Professor of Law at Harvard Law School. She is the author of Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age, co-author of The Responsive City: Engaging Communities Through Data-Smart Governance, author of FIBER: The Coming Tech Revolution—and Why America Might Miss It, and a contributor to WIRED.com. She served as Special Assistant to the President for Science, Technology, and Innovation Policy (2009) and co-led the FCC transition team between the Bush and Obama administrations. She also served as a member of Mayor Michael Bloomberg’s Advisory Council on Technology and Innovation and Mayor Bill de Blasio’s Broadband Task Force. Ms. Crawford was formerly a (Visiting) Stanton Professor of the First Amendment at Harvard’s Kennedy School, a Visiting Professor at Harvard Law School, and a Professor at the University of Michigan Law School (2008-2010). As an academic, she teaches courses about cities, public leadership, technology, and communications policy. She was a member of the board of directors of ICANN from 2005-2008 and is the founder of OneWebDay, a global Earth Day for the internet that takes place each Sept. 22. One of Politico’s 50 Thinkers, Doers and Visionaries Transforming Politics in 2015; one of Fast Company’s Most Influential Women in Technology (2009); IP3 Awardee (2010); one of Prospect Magazine’s Top Ten Brains of the Digital Future (2011); and one of TIME Magazine’s Tech 40: The Most Influential Minds in Tech (2013). Ms. Crawford received her B.A. and J.D. from Yale University. She served as a clerk for Judge Raymond J. Dearie of the U.S. District Court for the Eastern District of New York, and was a partner at Wilmer, Cutler & Pickering (now WilmerHale) (Washington, D.C.) until the end of 2002, when she left that firm to enter the legal academy.

DAY 2 : WED. MAY 11, 2022

MORNING KEYNOTE

STEPHANIE MURPHY

Leadership and Talent Strategy
ADVISA

THE HYBRID MINDSET: BUILDING BLOCKS FOR A SUCCESSFUL HYBRID STRATEGY

Remote and hybrid work isn’t a new concept but the last two years have sent the concept of Hybrid Strategy into hyperdrive.  From changing roles to shifting formats, teams must rethink their approach to recruiting, onboarding, collaboration and roles.  So how do we thrive in the chaos and win in the unknown?  In this talk, ADVISA Leadership Consultant Stephanie Murphy will discuss the mindset shift required for resilience and the five building blocks that will make your hybrid strategy successful over the long haul. Attendees will walk away with insight and prompts they can take back to their teams to ensure hybrid work success no matter what gets thrown their way.

Read Bio

Stephanie first learned about PI® when her previous employer became a client in 2008. Her “Ah-ha!” moment came during analyst training when she gained a deeper understanding of the science behind her intuitive understanding.  While with that company, Stephanie excelled in a variety of sales and marketing leadership roles before becoming vice president of operations. Along the way, she earned an impressive five promotions in 10 years.  Stephanie earned her undergraduate degree in marketing from Michigan State University, and then added an MBA and a master’s degree in finance from the University of Michigan, Dearborn. Stephanie lives in Plymouth, Michigan, and primarily serves clients in our Detroit market.  She is married and has two children.

LUNCH KEYNOTE

NEIL RICHARDS

Koch Distinguished Professor in Law
Washington University in St. Louis

Director
Cordell Institute for Policy in Medicine & Law

WHY PRIVACY MATTERS

Now more than ever, governments and corporations have the power to know what we do, where we do it, who we do it with, and oftentimes, what we want to do in the future. In this discussion, Washington University St. Louis law professor Neil Richards lays out exactly why privacy is so vitally important, drastically misunderstood, and not dead by any stretch of the imagination. In reality, the fight over privacy in the digital age is just beginning, and the results of that fight will determine what kind of society we’ll inhabit. As we build a blueprint for the future in our digital world, privacy will continue to be an essential part of that blueprint to preserve our important, hard-won, and fragile human values.

Read Bio

Neil Richards is one of the world’s leading experts in privacy law, information law, and freedom of expression. He holds the Koch Distinguished Professorship at Washington University School of Law, where he co-directs the Cordell Institute for Policy in Medicine & Law. He is also an affiliate scholar with the Stanford Center for Internet and Society and the Yale Information Society Project, a Fellow at the Center for Democracy and Technology, and a consultant and expert in privacy cases. Richards serves on the board of the Future of Privacy Forum and is a member of the American Law Institute. He is the author of Intellectual Privacy (Oxford).

MMC 2022 COMMUNITY SUPPORTERS
Juniper Networks logo
Adva logo
Cisco logo
MMC 2022 SPONSORS

SILVER SPONSOR

Access Interactive

BRONZE SPONSOR

SCHOLARSHIPS

ATTEND MMC 2022 AT NO COST TO YOU OR YOUR INSTITUTION

Many member institutions are carefully considering event attendance costs. To ensure all who can benefit from MMC are able to attend, we are offering scholarships to cover the cost of registration for you and your colleagues. Simply visit our scholarship page below, let us know the sponsorship is for the registration cost of MMC, and our team will be in touch.

THIS OFFER IS FOR MERIT MEMBERS ONLY.

HOTEL & RESERVATIONS

Merit has held a limited block of rooms at a discounted rate for attendees of the Merit Member Conference 2022. Please follow this link to reserve a room at The Henry – while still available.

You need to login to contact with the Listing Owner. Click Here to log in.