For ICT Professionals Working in Higher Education & Research

September 26, 2017

Welcome to the QUESTnet Lite 2017 for ICT Professionals Working in Higher Education & Research

The 2017 QUESTnet Lite event is a one day forum bringing together the ICT leadership and Communities of Practice (CoP) of the regional higher education and research sector. The intended audience is ICT staff working in the higher education and research sector who would benefit from attending.

The concurrent sessions will focus on the QUDIT CoP areas of specialisation: Cybersecurity, Data Centres & eWaste; Identity Management, Networks (with an emphasis on IoT) and Service Management.

QUESTnet Lite 2017

Tuesday 26 September 2017
Level 3 S Block
Gardens Point Campus (City) QUT

Conference Schedule

Check the program for this year's conference and learn about the speakers and sessions in store for attendees to QUESTnet Lite 2017.

Dr Ivano Bongiovanni
Post Doctoral Research Fellow

The presentation illustrates some of the dynamics that characterise the digital economy and the transition from an Economy of Corporations to an Economy of People and Things. In this scenario, traditional competitive postures are often detrimental for public and private organisations and collaborative efforts seem to yield better results for the end-users. Through the affordances of the digital technologies, the most successful companies exploit network effects to produce increased value for their customers and revenue resilience for themselves. What can universities do in this space? How can they avoid fighting in a red ocean in which the winner is simply the most successful in attracting students? Can IT departments join forces in a blue ocean of opportunities to deliver more innovative services?

Skye Wu
Lead Discovery Analyst, Telstra

Ever wonder what hidden stories your data have to tell? Advanced Security Analytics helps answer the difficult questions by finding and extracting the knowledge already possessed by companies; lost in their hundreds, thousands gigabytes of existing data. Skye will share with you the stories that would have remained hidden if not for Advanced Security Analytics.

Ashley Deuble
Cybersecurity Manager, Griffith University

Transforming Cybersecurity at Griffith University–Roadmap to Success

Mike Holm
Operations Manager, AusCERT

AusCERT will explain the typical threats to university information and technology systems, and walk through real life examples of system administrators defending their networks. The technology behind AusCERT’s CAUDIT ISAC Pilot (Information Sharing and Analysis Centre) will be showcased along with an update on the Pilot’s progress.

12:30 PM

Wade Alcorn
Managing Director Alcorn Group

Why are browsers involved in many APTs? In this presentation you will learn how the web browsers in your organisation provide an opportunity for an attacker. You will explore and understand how they provide a great return of investment for your adversaries. You know them, you love them but how far can you trust them?

Dr Cassandra Cross
Senior Lecturer & Undergraduate Coordinator, QUT

This presentation focuses on cybercrime victims, particularly those who experience online fraud. Drawing from the narratives of victims themselves, it highlights the various ways in which they are targeted and the ways in which offenders gain trust and compliance from victims. Further, it illustrates the many challenges involved in attempting to report online fraud and gain an acknowledgement of victimisation. Finally, the presentation explores current support measures that are in place to assist victims with recovery. Overall, it highlights the many areas for improvement needed across the fraud justice network which can markedly improve outcomes for online fraud victims.

Peter Embleton
Coordinator, Specialist Technologies

You have 100 guests coming to campus, they wont all arrive at the same time, some are going to want only internet access but some will want access to your protected networks. They are all running some bizarre operating system with no anti-virus or up to date patches and only a few people really know what they are doing there in the first place. Some of the guests may leave with new ones replacing them, they wont give you any notice of this but will want the same access.
Sounds like an Identity Management problem

Andres Canello
Senior Program Manager

Come and hear about Azure Active Directory Premium, what is inside the box and some quick deployment wins. We will also talk about what’s coming.

Heath Marks
CEO, Australian Access Federation

As the national provider of access and authentication for the higher education and research sector the AAF provides national and international access to essential research capabilities. As a core underpinning research capability, the AAF is continually evolving identity management solutions for the Australian research and higher education sector.
As we look towards the future and the possibilities for access and authentication the AAF is leading the way to ensure greater uptake and accessibility to research services, data, and facilities.
As Thought Leaders in Identity Management (IdM), the AAF is exploring IdM developments and the evolving needs of higher education and research in Australia and globally. Throughout 2017 the AAF have been exploring:

12:30 PM

Rob Hanson
Senior Research Consultant, DATA61

Blockchain, also known as Distributed Ledger Technology, is far more than crypto-currency. Distributed Ledger Technology (DLT) has the potential to fundamentally redesign the way business processes interact with information systems. This technology and its application is an emerging field, but identity is at the very heart of the matter. Rob Hanson, lead author for CSIRO’s Data61 report ``Distributed Ledgers: Scenarios for the Australian economy over the coming decades`` will explain what the potential of this technology is and will explore identity use cases, expanding upon the material in the report, including the use case for academic transcripts and how this could plausibly revolutionise the education sector.

Jaynesh Narain
Manager Digital Trust, PwC Brisbane

The perimeter of a higher-education environment is no longer a distinct boundary that separates the outside from the inside. Over time, to cater for the nature of access to students, staff and others, boundaries are starting to become less and less distinct. Universities are no longer ‘behind the firewall’ where they can close themselves off to the outside world. These institutions must be open and accessible. So how do we maintain a traditional security ‘container’ to protect our critical assets whilst maintaining the objectives that we all strive to meet through open and accessible services? In the absence of traditional perimeter based defences such as firewalls and IPS, IAM is now becoming the primary gatekeeper into the organisation and must be considered as one of the first lines of your defence.

Leonard D’Costa
Director MRI E-cycle Solutions

We are all aware of the horror stories surrounding eWaste recycling around the world. It is important to know what role you can play in your organisation to ensure your material is kept out of landfill and handled in the correct manner. By choosing a responsible eWaste partner you help to create jobs in Australia and lessen your dependence on landfill.

Don Mackintosh

Universities are well positioned to take advantage of their network connectivity. The presentation will cover how your network can connect you to AWS and MS AZURE like services. It will also cover connectivity to Commercial Data Centres.

12:30 PM

Alan Waite

Most traditional IT organizations have existing data centers that need continued support while cloud technologies are adopted. Organizations will increasingly live in a hybrid world with some applications in the public cloud and others in data centers. Gartner sees a hybrid IT world emerging in four distinct deployment scenarios, which we review in this session.

Speakers from QUT, UQ, Griffith & CQU - see bio's

Speakers from universities which use the Stuxureware product will outline their experiences and forward plans.

Julianne Weekers
Network Engineer, CQU

The session will be a BOF style round table to share current experience and plans in the IoT space.

Michael Boland
Distinguished Systems Engineer

This session will provide a short overview of IoT systems architecture. An introduction to the IoT World Forum reference model will be made focusing on the requirement for an IoT Edge computing (Fog) layer within the model, and common IoT system deployment patterns will be highlighted.

An overview of the Cisco IoT Kinetic system will be given as an example of a distributed edge computing architecture, and an Oil & Gas industry IoT use case will be presented that demonstrates a large-scale example of FoG computing.

Examples of other real-world problem areas from the resources sector will be featured where IoT systems can provide significant business value.

Don Mackintosh
QLD and NT Customer Relations Manager, AARNet

Universities are well positioned to take advantage of their network connectivity. The presentation will cover how your network can connect you to AWS and MS AZURE like services. It will also cover connectivity to Commercial Data Centres.

12:30 PM

John Bews
Manager Specialised Design & Support, Telstra

The aim of this presentation is to introduce people to the key concepts of cellular IoT and to highlight the ways that this can be applied in real world situations.

Dave Swain

There is no doubt that the future of cattle production systems in northern Australia will involve increased use of information technology and communication infrastructure. Remote rural locations have significant challenges associated with communications infrastructure. Future technology solutions will be more refined and subtle and using autonomous monitoring, communication and in some cases control systems. They will provide the right information at the right time in the right place to enable the right decision. The development of the Internet of Things (IoT) has created a focus around small scale computing that often occurs in remote locations. This talk provides an overview of the CQUni experiences in developing and delivering autonomous livestock management systems. The careful integration of technology and more refined algorithms underpins the research and development. Perhaps one of the side benefits is by bolting together IT infrastructure we are finding out how to deliver real IoT value.

Rose Dyson
Service Management Consultant

In this presentation Rose will share her experience in designing and implementing Service Catalogues at organisations of all types, hospitality, education, law, medical, mining, and not for profit industries. The highlight will be in the benefits of a Service Catalogue, how the catalogue is implemented as well as common myths and mistakes about the catalogue.

Julie Land
Head, IT Services & Support

The traditional approach to technology maturity, development and adoption has been projected from the view of the developer and or technology provider rather than from the adopter’s perspective. This was the natural evolution of a new IT product.
Some of the barriers to technology adoption that we have identified and encountered are:
• Lack of leadership/support for innovation
• Comfort level- effect of disruption
• Time to make changes and adjust
• Understanding of and ability to implement
• Social implications e.g. changes in collaboration communications styles
• Current processes or procedures
• Budgetary priorities
• Difficulty/availability/time for training
• Resistance to learning new technology
• Work stress/overload
• Proof of value
• Reliability- e.g. will it continue to provide value

How do we develop a process that will provide optimal outcomes for our staff and students and the business…What are the catalysts and inhibitors to adoption.

Marty Miller-Crispe
Service Management Office Manager, Griffith University

Enterprise Service Management (ESM) has it's roots in IT Service Management (ITSM). However, unlike ITSM there is no clearly defined framework for ESM. ITSM Frameworks such as ITIL and COBIT can help to define an ESM discipline but due to a strong IT focus can only be used for the broad brush strokes. Other methodologies such as Lean and Agile are also useful starting points.
Traditional ITSM vendors are also now touting their tools sets as Enterprise Service Management ready. Axios, Cherwell, and Service Now are examples of organisations that are promoting themselves as providing tools that offer Enterprise Service Management capabilities.
But how successful are they? What does it take to establish an Enterprise Service Desk? And what benefits can be gained from developing a shared services ESM team and platform?

12:30 PM

Jonathan Pike
Service Centre Manager, University of Melbourne

The presentation will be a short journey through the new UOM Melbourne Operating Model, the formation of University Services and how using Service Now and a KCS methodology we are seeing huge benefits organisation wide that are scalable across portfolios.

Jessica Lees
Associate Director, Client Services, CQUniveristy

Staff are the most important piece of the puzzle when providing services and support across universities but retaining them can often be challenging.
This discussion will be an interactive session looking at the importance of training and engagement in order to motivate staff and teams to achieve results. It will be an opportunity to explore shared experiences and the importance of recognition as part of supporting teams that strive in difficult environments.

15:00 PM

Professor Geoff Goodhill
Professor Mathematics, Professor Qld Brain Institute

It has recently become possible to image the activity of hundreds of neurons simultaneously, for long periods of time, in the brain of the larval zebrafish. Decoding the data produced raises many challenging computational and mathematical problems. I will talk about our current work addressing these issues, and what this reveals about patterns of brain activity in early life.

QUESTnet Lite 2017: For ICT Professionals Working in Higher Education & Research

Get in touch

If you have any questions about the event please don’t hestitate to contact us.

E-mail us