Tech Talk May 30th

Please vote for/add topics you'd like to hear more about at our Open Space Technology Tech Talk on May 30th

You've used all your votes and won't be able to post a new idea, but you can still search and comment on existing ideas.

There are two ways to get more votes:

  • When an admin closes an idea you've voted on, you'll get your votes back from that idea.
  • You can remove your votes from an open idea you support.
  • To see ideas you have already voted on, select the "My feedback" filter and select "My open ideas".
(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  1. How to protect weblogin users from phishing attacks

    Our weblogin site was hit with a flurry of phishing attempts earlier this year. We ought to assume this will happen again. Explore how we can better protect our weblogin users from these attacks.

    Internet2 is launching a 'cohortium' to pursue this question.
    See: https://spaces.internet2.edu/x/BAEfAg

    They have mostly questions. We want answers.

    11 votes
    Vote
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      I agree to the terms of service
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      1 comment  ·  Flag idea as inappropriate…  ·  Admin →
    • Identify all your configuration items in 30min or less!

      Right before this Tech Talk several of us in CI-IAM are going to analyze a new technical component in our authentication architecture: the UW Social2SAML gateway. During this proposed session, we'd like to share our analysis and, more so, discuss with other like-minded CI'ers what tools and processes we used to break components into their configuration items and get each one into some sort of configuration management regime. If you're a subject matter expert in this area, please vote for this item and attend. We want to learn from what you're doing!

      9 votes
      Vote
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        I agree to the terms of service
        Signed in as (Sign out)
        You have left! (?) (thinking…)
        0 comments  ·  Flag idea as inappropriate…  ·  Admin →
      • Metrics

        What do you collect?
        How do you collect it?
        Where do you visualize it?
        What might you feed to the new ITIL system?

        6 votes
        Vote
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          I agree to the terms of service
          Signed in as (Sign out)
          You have left! (?) (thinking…)
          0 comments  ·  Flag idea as inappropriate…  ·  Admin →

        Tech Talk May 30th

        Feedback and Knowledge Base