JOIN US FOR THE 2020 MERIT MEMBER CONFERENCE
MMC 2020 AGENDA
President & CEO, Merit Network
Pierrette DaggDirector of Marketing and Communications, Merit Network
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m77a08553bf5058541333907168eea175
Password: dHJcQzEP332
Host Key: 184055
Director of Technology, Southern California Tribal Chairman's Association, Partnering and Business Development, Arcadian Infracom
Read Abstract
What has changed on the broadband front in Indian Country...wait...has anything changed?
In this session, keynote speaker Matthew Rantanen will discuss the extensive but surmountable challenges faced by those seeking to connect the unconnected in the Western U.S. and beyond. From his many struggles and successes, Matthew has gained experiences that can serve as a blueprint for others within the broadband ecosystem looking to define their path forward.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m77a08553bf5058541333907168eea175
Password: dHJcQzEP332
Host Key: 184055
Disaster Recovery Planner, University of Michigan
Read Abstract
Everyone knows someone with bad password habits: using simplistic passwords, reusing the same password on multiple systems, writing down passwords on post-it notes, or sharing logins over email. These insecure habits put accounts at greater risk of unauthorized access and can create dependence on written references which are easily lost or misappropriated. With data breaches, phishing, and spoofing attacks on the rise, the importance of strong, unique passwords is ever increasing, yet establishing and maintaining good habits is challenging for most users. Implementing a password manager can address all of these challenges, and more. This session is intended for decision makers looking to strengthen their organization’s confidence in maintaining access to critical information and systems.
Learning Outcomes:
- Types of password managers and their feature sets
- Criteria for selecting a suitable platform for your organization
- Implementation tactics to drive user adoption
- Leverage centralized management to enhance access continuity
- Opportunities presented by using a password manager with a distributed workforce
- Methods of leveraging a password manager in disaster response planning
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=me8b3d360a38dd6cae31e1499e30dc596
Password: 7AQzFNrbm48
Host Key: 632815
IoT Technical Consulting Engineer, Palo Alto Networks
Mark BleeckerManager of IoT Security, Palo Alto Networks
Read Abstract
The rate of IoT device adoption is escalating at an uncontrollable pace, now occupying 30% of all devices in the average organization. Unlike typical IT devices that are purchased and managed by a single department, unmanaged IoT devices bring a swathe of legacy attack techniques and new malware threats for security teams.
Late last year, Gartner defined a new type of security platform — an evolution of SIG (Secure Internet Gateway) called Secure Access Service Edge, or SASE (pronounced “sassy”). Gartner predicts that SASE will become the new standard for security in the coming years, with at least 40% of enterprises adopting explicit SASE strategies by 2024.
In this session, attendees will:
- Gain a practical approach to securing devices across stages of the IoT security lifecycle
- Understand how to integrate IoT security into existing workflows of network security and security operations teams
- See a practical demonstration of an IoT security product in action
- Take away a step-by-step guide to implementing IoT security solutions
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=ma84b3763b38bb3dad587af6594066f2f
Password: MJxmXPtW228
Host Key: 285669
Cybersecurity Technical Solutions Architect, Cisco
Dave ArmstrongCybersecurity Specialist, Cisco
Read Abstract
As security shifts to the cloud, the tried-and-true perimeter-based model just can’t keep up. Today’s cybersecurity professionals are contending with an entirely new type of network and an entirely new set of security needs.
Late last year, Gartner defined a new type of security platform — an evolution of SIG (Secure Internet Gateway) called Secure Access Service Edge, or SASE (pronounced “sassy”). Gartner predicts that SASE will become the new standard for security in the coming years, with at least 40% of enterprises adopting explicit SASE strategies by 2024.
Attendees will learn:
- Where the security landscape is heading
- Identify the gaps in today's security stack
- Highlight the steps you can take to keep your organization safe and secure, today and tomorrow
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m612cbd37f30cd0cd672eda744b5c1404
Password: mNddCMyX798
Host Key: 980707
Executive Director, Next Century Cities
Read Abstract
Every resident in every community should have reliable and affordable access to broadband. However, millions of Americans – namely Indigenous, Brown, Black, rural, and low-income populations – continue to face insurmountable obstacles associated with being able to get online and meaningfully participate in a digital society.
This session will explore the societal cost of the digital divide and its impact on those who are locked out of digital opportunities with limited remedies. For instance, privacy concerns have become increasingly more serious when public Wi-Fi networks are filling in gaps for home broadband access but provide users with little-to-no control of third-party access to personal information being transmitted online. Further, those with unreliable connectivity may not have the requisite digital literacy to manage privacy concerns, let alone the resources for skills training that would attract high-tech job opportunities. Regardless of zip code, limited economic mobility and cycles of poverty only make it more difficult to maintain broadband subscriptions and access to digital tools. Consequently, the cyclone of how gaps in digital access intersect with privacy options, participation in a digital workforce, and economic opportunities has a ripple effect on communities that requires a coordinated response from every level of government.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m6a95952dcf62454641ad9bd7a248a622
Password: ygQmAz4bS83
Host Key: 930121
Sr. Product Marketing Manager, Proofpoint
David GraffInformation Security Department - Security Engineer, Michigan State University
Read Abstract
Over the course of the COVID-19 pandemic, many higher ed institutions found themselves having to quickly adapt by letting staff, faculty, and students work from the comfort of their homes. The WFH initiative brings new challenges as many remote workers do not always use a school-issued device and can access applications such as GSuite and O365 in a browser without additional security protection. During this session – which will feature a customer story from Michigan State University - Proofpoint will take a closer look at the benefits of securing your cloud-based assets, explore new capabilities in Proofpoint Cloud Security that will protect your BYOD workers without requiring agents, as well as provide visibility into 3rd party applications and account compromise. Attendees will leave with a better understanding of cloud security, the Proofpoint CASB offering, as well as the importance of protecting your cloud accounts and data.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m04bb3ac42194bd89af27950b51e105c3
Password: 4FZew9Ve8N3
Host Key: 405424
CEO, Collegiate Star League
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m261ca47299ef056e015f77cb23e72b31
Password: XmTkzc4Se58
Host Key: 706849
Senior Director Business Development Edge Cloud, ADVA
Read Abstract
As organizations take advantage of emerging network services, such as SD-WAN and enhanced security, the industry is recognizing there is a better way to deploy these over the traditional dedicated network appliance model of the past. Through the use of open, standards-based cloud/server technology, organizations are now able to leverage edge service platforms, known as Universal Customer Premise Equipment (uCPE), to deploy and manage services in a shared, open architecture that reduces cost, eliminates vendor lock-in, provides future-proofing for new services, and simplifies operations. In this presentation, we will cover how this is being done across the industry and how it is impacting the way organizations view the evolution of the network edge for the future of their businesses.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mc1dfea16cc01b9229ebd49da0ff3e386
Password: 3p9fF4m9K2r
Host Key: 647391
President & CEO, Merit Network
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mb931557ac44e769fd907c33b6c411d49
Password: uQ4kPuXp2X8
Host Key: 216660
Read Description
Join us as we celebrate the first day of MMC with a virtual how-to-make-a-cocktail hour. Our virtual mixologist will teach you how to create twists on the classic Moscow Mule using your new mug, compliments of Merit!
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=me4bcd8a05ce014bce2ed9d3371a198d8
Password: YTrdXhkB669
Host Key: 724115
Vice President For Community Engagement, Merit Network
Pierrette DaggDirector of Marketing and Communications, Merit Network
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m47200a9507b678bc9f71ca07d12ad935
Password: 3brMU3FAS5X
Host Key: 849837
Assistant Professor, Stamps School of Art & Design
Read Abstract
People’s ability to envision the future tends to fall between two unhealthy and unconstructive extremes. On one side, there are those who are blindly optimistic about technology. This attitude is sometimes termed “technosolutionism”, the naïve idea that every problem can be solved with technology. At the other extreme are those so critical of technology that they adopt an unrealistic Luddite attitude, avoiding technology altogether; or they assume that a dystopian future is inevitable and, as a result, become passive. Critical optimism navigates between these two extremes, encouraging an earnest hopefulness that also incorporates a healthy dose of criticality. What futures are possible, which are probable, and, most importantly, which might be preferred?
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m47200a9507b678bc9f71ca07d12ad935
Password: 3brMU3FAS5X
Host Key: 849837
President, Aspen Wireless Technologies, Inc
Read Abstract
Share from our experience of setting up fiber to the premise for your city. Learn from two cities as they have gotten from concept, to regulatory, to implementation, to setting expectations for the community and governmental challenges of bringing Broadband to your community.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=ma18ec23099b3c219dd3c7e3140fac8d4
Password: Kpxv3u5ce5j
Host Key: 663371
Program Manager, NET+ Cloud Services - Security and Identity, Internet 2
Read Abstract
Cloud vendor security assessments have not stopped being a hot topic for information security, and managing all of the cloud services on a campus could seem like being a mountain climber caught in an avalanche! The Shared Cloud Security Assessment Working Group updated the HECVAT and developed additional resources for the community in 2019 based on community input. In 2019, an on-prem and triage versions were added. Using cases and giving feedback to the working group, this session will go over updates from 2019, community adoption, and plans for 2020.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=md6f6f384c2d4a97cc7b09ce3621c6c57
Password: R62RpgQWXS7
Host Key: 910993
President, TelNet Worldwide
Read Abstract
With the FCC's deadline for STIR/SHAKEN less than a year away, there are important issues you need to know. We'll answer: How will your calls be signed in a post STIR/SHAKEN world? Do you need to sign your own calls? What types of legitimate calls might get blocked and what can you do? What tools can you employ to minimize digital distractions? Join this session on practical advise on easing your robocalling/spoofing concerns and get an update on E911 compliance requirements for the coming year
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m52514156446682c84db0c7190c290ec0
Password: Y9EdDJNzG47
Host Key: 438118
Graduate Student Researchers, University of Michigan
Read Abstract
Human thinking can do some amazing things! How do we do it? There are many aspects of human cognition that we don't yet understand how to do with computers. However, researchers now agree upon some high-level systems that summarize how the brain works, and we can implement these in computers to simulate (sometimes intelligent!) human behavior. In our talk, we'll describe the current high-level understanding of human cognition, and some of the challenges that still face us in our own research into human general intelligence.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mdac74fecee8f021d05d43d734650cad1
Password: ECr5MXJRF32
Host Key: 868017
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m91c834128a58ed73b3ca831613be6a61
Password: hbMKAeJ5z36
Host Key: 852883
Vice President of Strategy & Research, Merit Network
Read Abstract
MiND brings together networking and technology professionals to collaborate on emerging technologies and to address current networking issues, concerns and successes with other skilled network engineers, directors and technicians.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m0fc34e577d8f65db8586867c2def34f3
Password: Pd5z79w4iMc
Host Key: 198563
Vice President of Technology Operations, Merit Network
Read Abstract
MITE enables tech leaders in Michigan to discuss best practices, share ideas and collaborate on tech-related issues.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m7fd543251af34755232a5ba64acd14f0
Password: vpVX9uXPH32
Host Key: 605166
Chief Information Security Officer, Merit Network
Read Abstract
This group brings together security leaders to discuss cybersecurity topics, policies and roadmaps.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mb3bc8228eb0604c70becb40ea1769018
Password: fsETkF3Rp82
Host Key: 527563
Executive Director of Product Management, Merit Network
Read Abstract
The esports community of practice brings together peers to discuss the emerging esports landscape, how members are getting started and the larger societal impact.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m2a8d725c2e6a89a144ffd7dcc505d07c
Password: gkAt8iR9CQ2
Host Key: 755164
Chief Information Security Officer, Merit Network
Pierrette DaggDirector of Marketing and Communications, Merit Network
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=me5d4a69661f29e8ddc92c4d5173e3c0a
Password: YSu9Yn4j5xD
Host Key: 819317
Read Description
Put your skills to the test with a virtual game of capture the flag. Beginners and experts alike can use open-source tools to fire off live attacks on networked systems in real-time. Highest score at the end of the day wins a prize!
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m2a7478c84cf00024aa6c1b25781df2da
Password: MJfWg3GWD35
Host Key: 471157
Makerspace Director, University of Liggett School
Read Abstract
Schools all over the world have had to pivot to online instruction with the Covid outbreaks running rampage across the globe. Many thought that this would hurt the Maker movement, but that couldn't be further from the truth. Makers from around the world were the first to step up and provide PPE for frontline workers when shortages started to appear. Many of these makers were coming from schools. Now, as schools are starting again, making has not stopped for students or for teachers. Digital and physical making can still take place whether students are at home or in the classroom. With the use of Minecraft Education Edition, Adobe products, and simple items around the home, teaching design, problem solving, and critical thinking are still possible, and very much needed, in the Age of Covid. This session will explore the different ways that students have been able to engage in Maker activities in person and remotely. If you are looking for ways to engage students in the Maker Mentality in today's environment, this is a session you will not want to miss.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=me5d4a69661f29e8ddc92c4d5173e3c0a
Password: YSu9Yn4j5xD
Host Key: 819317
Talent Optimization, ADVISA
Read Abstract
How much control do you have over the challenges you face? How do you garner support from leadership? Many of our daily hurdles fall within our “sphere of influence”—we may have some control over their outcomes, but we must depend on other people and factors outside of ourselves to vault over the rift. In this session, participants will be able to use the Control Model to identify productive actions in response to their key workplace challenges, identify what support they need from their leaders to effectively address their challenges and apply the “Big 3” to create relationships and facilitate more effective upward influence as needed.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m98de32bd483701f58d075d280510593c
Password: GDkuTJnr873
Host Key: 199099
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mc3c00b463c61cb4e8d60f4648f1f2345
Password: qA3nbPcxx24
Host Key: 156764
Executive Director Product Management, Merit Network
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m4fe9862fec081e9daefc0e05bba8eea0
Password: SWmdYyB6a23
Host Key: 318338
Let's Go Threat Hunting: Expert Tips for Enhancing Hunting in Your Organization
Sr. Technical Product Manager, CrowdStrike
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m86997654b96be8b8e03052dbc1933a47
Password: p5PP2CtfWW5
Host Key: 776732
Podcast Host and Executive Producer, iHeart Radio
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m919ebfbd3a94087e7578c6f93be26ebe
Password: XEqEtkPj236
Host Key: 981456
ADC Engineer III, Michigan State University
Read Abstract
This presentation will demonstrate how management of complex infrastructure systems can be efficiently managed using automation tools like Ansible. While the cases presented will focus primarily on managing F5 BIG-IP systems, the concepts covered also apply to other areas of network, server, and application management.
Michigan State University has recently transitioned management of the BIG-IP landscape to the Application Services team, with a primary focus on improving integration with the applications delivered via the F5, and improvements to processes. These improvements are being undertaken using Ansible in a process automation paradigm.
Central Michigan University recently undertook a major transformation in their BIG-IP landscape. Starting with a simple pair of LTM+APM appliances on their main campus with a highly-customized Access Policy for web application SSO, they've moved to a multiple-location environment with BIG-IP DNS with Multi-Factor authentication used with APM, with an eye toward IPv6 deployment in the near future, all without additional resources. This transformation was enabled using Ansible in a configuration-as-code paradigm.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m63fb52a388a75d224c7524bc4876cc7d
Password: gFsm37j2Eic
Host Key: 186519
Executive Director Product Management, Merit Network
Pierrette DaggDirector of Marketing and Communications, Merit Network
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m4c6c1955e347b724902167375a85c562
Password: 2ysXRMhXi33
Host Key: 767845
Professor of Media, Communications and Social Theory, London School of Economics and Political Science
Dr. Ulises MejiasAssociate Professor of Communication Studies and Director of the Institute for Global Engagement, State University of New York at Oswego
Read Abstract
This talk will introduce the speakers’ new book, The Costs of Connection: How Data Colonizes Human Life and Appropriates it for Capitalism (Stanford University Press, August 2019). Couldry and Mejias argue that the role of data in society needs to be grasped as not only a development of capitalism, but as the start of a new phase in human history that rivals in importance the emergence of historic colonialism. This new "data colonialism" is based not on the extraction of natural resources or labor, but on the appropriation of human life through data, paving the way for a further stage of capitalism. Today’s transformations of social life through data must therefore be grasped within the long historical arc of dispossession as both a new colonialism and an extension of capitalism. Resistance requires challenging in their new material guises forms of coloniality that decolonial thinking has foregrounded for centuries. The struggle will be both broader and longer than many analyses of algorithmic power suppose, but for that reason critical responses are all the more urgent. New forms of solidarity are needed that help build connection on different terms from those currently on offer.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m4c6c1955e347b724902167375a85c562
Password: 2ysXRMhXi33
Host Key: 767845
Senior Fellow, Benton Institute for Broadband & Society
Read Abstract
In October 2019, the Benton Institute for Broadband & Society issued a report entitled Broadband for America’s Future: A Vision for the 2020s. The agenda was comprehensive, constructed upon achievements in communities and contained insights from experts across the nation. When we released the report last fall, we did not know that the world would be changed permanently in 2020. Healthcare, education, work, and government services will rely more on broadband than ever--even after the crisis subsides. It’s time to build a comprehensive broadband agenda, informed by state and local leadership and innovation, to promote digital equity, advance deployment, spur competition, and empower community anchor institutions. The sooner we do so, the sooner we will reap the boundless benefits that come when every person can use High Performance Broadband from their home.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mae08e267861892edf5069165ab2bd6e
Password: 344jZSmFxuJ
Host Key: 853472
Staff Solutions Architect, Red Hat
Read Abstract
Enterprise Automation can take your IT Department from the Department of No to the Department of Go. Whether your market is Citizens, Students or Sales, your customers are constantly looking for ways to go to market quicker than ever before. They want a fast lane to get from point A to point B and their initial choice is you. But you currently can only provide toll booths and traffic control. Learn how to give them a fast lane to success before they veer off into the unknown neighborhoods and intersections of Shadow IT. By unifying the silos of IT through automation and the collaboration of workflows, not only will you be in the fast lane, you'll BE the fast lane in no time.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mad69282a9537e08a4ad823d776517491
Password: dNt4Jp9mnY4
Host Key: 582464
Executive Director Product Management, Merit Network
Lori TirpakInterim Chief Information Officer, Oakland University
Scott PuckettSenior Director of Information Technology, Western Michigan University
Zach WigalFounder, Gamers Outreach
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mddc18c5759b5fed246478cb3681e27c7
Password: TMdPF9D2p9Q
Host Key: 664574
Senior Research Assistant, Oregon Health & Science University
Read Abstract
In 1962 under President Kennedy’s direction, our nation committed itself to “landing a man on the moon and returning him safely to earth.” At the time, this goal was physically impossible. In order to accomplish this goal, it had to be broken down into component tasks. Accomplishing these tasks determined the mission objectives of the Mercury, Gemini and Apollo programs. Samuel Carpenter discusses not only the accomplishments of these early space exploration efforts, but also outlines a general process of how to take on impossible goals. You will be able to apply this process in your own lives in order to achieve your ‘impossible’, whatever that happens to be.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m5cab139d379a2ed304d329b84e3a8dc7
Password: VmgX5cumh53
Host Key: 224240
President & CEO, Merit Network
Pierrette DaggDirector of Marketing and Communications, Merit Network
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m1986f3b655ed87184bf2c68e550b0063
Password: HWg2CUQum22
Host Key: 209297
Director of Marketing & Communications, Merit Network
Danielle ClairBusiness Systems Project Manager, Merit Network
Amy StuyvesantBusiness Systems GIS & Data Analyst, Merit Network
Read Abstract
The Michigan Moonshot aims to act as a catalyst in the broadband ecosystem by informing policy makers, fostering public-private partnerships and convening collaboration between citizens and organizations in our state. The Moonshot data collection process provides accurate, granular connectivity and resident sentiment data, which can be leveraged by municipalities, educational institutions, broadband task forces, county governments and those working to expand connectivity for the purposes of broadband planning and to support grant applications.
A thorough understanding of address-level broadband access, the speeds of that connectivity and citizens’ attitudes regarding service plans and price points is critical in the early planning and engagement process of a community network journey.
This session will be an overview of the ways in which citizen-driven data collection and GIS mapping can be used to support broadband planning. This presentation will provide a walkthrough of survey collection methodology for both connected and unconnected residents and a demonstration of potential data visualizations and maps that can be created from the data generated from these sources.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m1986f3b655ed87184bf2c68e550b0063
Password: HWg2CUQum22
Host Key: 209297
Managed Securities Business Development, Specialist Novacoast Inc.
Jim DargaDirector, Pinckney Cyber Training Institute
Read Abstract
Problem Statement Cybersecurity attacks against public entities which include but are not limited to municipalities, court systems, and public school systems are increasing at an alarming rate across Michigan as well as the nation. However, public entities in large part do not have the technical infrastructure and/or human resources to develop an effective cybersecurity defensive strategy to mitigate the risk. Compounding the problem, public entities typically do not have the financial resources to leverage the services of a commercial security operations center magnifying their cybersecurity attack vulnerability.
Solution Create a public/private partnership to develop a security operations center (SOC) which is managed by a commercial security operations center and operated by a Michigan Cyber Range hub. The Pinckney Cyber Training Institute has partnered with Novacoast Inc. and is scheduled to go live on September 8, 2020 providing threat detection service to public entities and small businesses in Michigan in a cost effective manner. Pinckney CTI will staff the SOC with student interns , while Novacoast Inc. will provide technical expertise and management support.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=me91756e61306636aff26414d55648d11
Password: Yi6PjmWVY54
Host Key: 648515
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=me376f160904b265fedfab7ff32f11630
Password: dyPaMMia245
Host Key: 766421
Chair, Washtenaw County Broadband Task Force
Ben FinemanPresident & Co founder, Michigan Broadband Cooperative
Charlotte BewersdorffVice President of Community Engagement, Merit Network
Dr. Johannes M. BauerQuello Chair for Media and Information Policy, Michigan State University
Joshua EdmondsDirector of Digital Inclusion, City of Detroit, Department of Innovation and Technology (DoIT)
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mb425de69725cb8b1e4598604751ab116
Password: rsJFeK2zb58
Host Key: 846612
Chief Information Security Officer, Merit Network
Read Description
Put your disaster recovery protocols to the test or watch fellow members face their doom! This is a great opportunity to watch or possibly participate in unique scenarios created around a fictitious organization faced with dangerous cyber incidents.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=mac62ec73bfe546de3c457504d96bc1e6
Password: fPtz5in9qV8
Host Key: 942953
Chief Information Security Officer, Merit Network
Read Description
We set off again with a new set of players! Put your disaster recovery protocols to the test or watch fellow members face their doom! This is a great opportunity to watch or possibly participate in unique scenarios created around a fictitious organization faced with dangerous cyber incidents.
Webex Info
Link: https://merit.webex.com/merit/j.php?MTID=m195245d5cfd117cd0569820d48c4111e
Password: BEkepByt573
Host Key: 590431