Tuesday, June 15, 2021
Tuesday, June 15, 2021
4:00 p.m. - 5:00 p.m. | Keynote: Why Digital Trust Should Be #1 in Your Institution’s Privacy PracticesPresented by: Joanna Grama and Jim Siegl Too often, the concept of Digital Trust (DT) is buried in the conversation when it comes to privacy practices. What are the best methods and strategies to shine the spotlight on Digital Trust and make it an integral part of your privacy practice? Kick-off your Digital Trust Summit experience with Future of Privacy Forum technologists, Joanna Grama and Jim Siegl, who collectively bring more than 40 years of Digital Trust experience collectively. In this keynote, they will share concrete examples of how to ensure that earned trust is kept when developing privacy practices at your university, discuss learner analytics and the promise of big data, explain what we can learn about DT from K-12 and offer five practice areas for building a trusted ecosystem. |
|
5:00 p.m. - 6:00 p.m. | ReceptionClose out Day 1 of the Digital Trust Summit with our Opening Reception, complete with games (with prizes!) and music from pop rock singer/songwriter Warick Pond. Thanks to our Gold Co-convener, Toptal, for hosting our festivities! Warick is the recipient of the All City Music award, studied improvisational blues guitar at the Summit Music Studio in New Jersey and his band Moot was the winner of the Tri-state battle of the bands in 1997. |
Wednesday, June 16, 2021
Wednesday, June 16, 2021
9:00 a.m. - 10:00 a.m. | Student Panel : Digital Trust Now & in the FuturePanelists: Our student panel will create an open forum environment for industry professionals and prospective employers to engage directly with current ASU students. Foster and gain a deeper understanding of how the next generation of digital trust professionals can provide a new perspective and beneficial insights on digital trust. This panel will also provide student participants insight into the state of the current professional landscape and what skill and knowledge sets are valued in the industry. | |
10:15 a.m. - 11:00 a.m. | Keynote by Adah Parris and Marques Anderson: How Might We Approach Individual and Collective Sovereignty in the 21st Century?The 21st Century is integrating developments in biology, materials and information technologies at an accelerating pace. Therefore, the future of how humans relate to and intertwine with technology and machines is being defined at this very moment. As we evolve into shaping and defining a new technological infrastructure, what needs to be considered as we approach trust technologies like sovereign identity, blockchain, cryptocurrencies and decentralized autonomous organizations alongside digital experiences that prioritize Agency? How might we shift from historical institutional models to new integrated self-determining models that support a regenerative future? Visionaries Adah Parris (Futurist, Cultural Strategist and Systems Artist) and Marques D. Anderson (Cyborg anthropologist, innovator and worldbuilder) will explore these questions and use the lens of ancient wisdom to uncover new approaches to digital trust. |
|
11:15 a.m. - 12:00 p.m. | Neighborhood Breakouts: Pick one of the multiple sessions to sit in on | |
Cyber Security and the Future of WorkPresented by: Ismael Peinado, CTO, Toptal The Future of Work -- distributed teams spread across continents and a mix of full-time and contract talent -- presents new security challenges. Even after more than a year of forced remote work, most companies still do not understand the biggest threats to their security. In this session, Ismael Peinado, CTO at Toptal, the world’s largest fully remote company, will address the most critical security risks facing companies of all sizes and how to prevent them. In this session you will learn: * Common security policies vs. the reality of today's threats |
| |
| How to Implement a People-Centric Approach to CybersecurityPresented by: Curtis Wray, Security Solutions Architect, Proofpoint Cyber-attackers have shifted their focus from exploiting the defender’s infrastructure into exploiting people — Facebook and LinkedIn have now become the attacker’s greatest asset in their penetration toolset. While there is still a need for traditional security tools and all the logs and forensics that come with them, aligning a defensive security strategy with the same way attackers operate is both a more efficient and effective approach. In this session, you’ll gain a deeper understanding of your people (in how they are attacked), what business privileges they have (and therefore the potential business risks associated with that) and their potential vulnerabilities in order to augment existing security frameworks and methodologies in a more people-centric way. |
|
| ASU Equity Framework and Implications for the Trusted Learner NetworkPresented by: Rasmus Lynnerup, Assistant Vice Provost, Academic Alliances As new technology is implemented, concerns of the equity of outcomes arise. To ensure equitable outcomes, systems and processes need to be designed and consistently managed with the end in mind. This session will outline an approach and management structure to be implemented during the scale-up of the Trusted Learner Network. |
|
12:15 p.m. - 1:00 p.m. | Neighborhood Breakouts: Pick one of the multiple sessions to sit in on | |
| Three Student Privacy Conversation StartersPresented by: Higher education’s increasingly complex technology and data landscape has brought student privacy issues to the front pages of national publications. Yet, engaging students in conversations about privacy remains elusive. In this session, we will discuss three ways the University of Michigan has sought to raise students’ privacy awareness and empowerment. Hear an administrator's and a student’s perspective on how these three efforts started and evolved. | |
| Rethinking Technology Investments Leveraging Zero TrustPresented by: The last year and a half has proven challenging to many areas of work and life – and cybersecurity resiliency is one important area that has been tested. We’ve all heard quite a bit about the escalating cyberattacks and the need to accelerate innovation and transformation to protect each of our organizations and it takes strong partnerships to get there. Hear cybersecurity experts from the State of Arizona and City of Phoenix as they tell stories from their recent successful initiatives and what they’ve identified as the most critical next steps to mature their cybersecurity posture taking Zero Trust principles well beyond just a buzzword and into production implementations. | |
Advancing agency and digital trust within education and workforcePanelists:Stephen Yadzinski, Senior Innovation Officer, JFFLabs Diana Ayton-Shenker, Chief Executive Officer at ASU-Leonardo Initiative Kim Hamilton Duffy, Architect, Digital Credentials Consortium, MIT Michele Spires, Acting Executive Director, ACE Moderated by: Timothy Summers, ASU UTO Executive Director of Digital Trust Initiatives To match today’s rapidly evolving workforce, individuals are constantly seeking opportunities to upskill and reskill in order to keep pace with the future of work. Establishing digital trust for the enhancement of learning and development is essential for both learning institutions and employers. *Empowering all learners *Unlocking lifelong learners *Improving economic mobility *Intersection with all industries including creative industries Join industry and education leaders as they discuss the future of digital identity management systems as ways to establish trust and advance agency. | ||
| Putting agency and trust at the center of our universe requires the creation of authentic communities that are empowered to engage and collaborate.Presented by:Termeh Rassi, Strategy and Impact Advisor, ASU-Leonardo Initiative Danielle Siembieda, Creative Director, ASU-Leonardo Initiative As practitioners, community builders and designers, our challenge is to create inclusive spaces that accommodate and mirror the diversity of participants and the context of their interaction. In this session, we will expand on the definitions of both trust and agency; and look at specific ways in which the global Leonardo community has continued to thrive, collaborate and co-create itself. We invite you to join us as we take your through our online exhibition of Lumen Prize; as we share the power of our co-created global community, Laser; and as we talk about our latest project, Criptech Incubator, designed to engage and remake creative technologies through the lens of accessibility. As a not-for-profit 501(c)3 enterprising think tank, Leonardo has offered a global platform for creative exploration and collaboration since 1968, reaching tens of thousands of people across 134 countries. Our flagship publication, Leonardo, the world’s leading scholarly journal on trans-disciplinary art, anchors a robust publishing partnership with MIT Press; our partnership with Arizona State University infuses educational innovation with digital art and media for lifelong learning. Our creative programs span thought-provoking events, exhibits, residencies and fellowships, scholarship and social enterprise ventures. | |
1:00 p.m. - 1:15 p.m. | Daily Wrap Up | |
4:00 p.m. - 5:30 p.m. Join here | Innov8: A Speaker SeriesHosted by: Timothy Summers, ASU UTO Executive Director of Digital Trust Initiatives ASU is using the latest advances in distributed technology to design and build a digital wallet and portfolio for learners to access their portable learner record. Join us for a special edition of Innov8: A Speaker Series to learn more about how Pocket uses the future of digital identity management to build a network of trust between learners, institutions and professional organizations. This session will bring together an amazing group of Arizona State University Technology Office professionals. Hosted by: Timothy Summers, ASU UTO Executive Director of Digital Trust Initiatives Lev Gonick Chief Information Officer Participants will get an exclusive first-look inside of Pocket’s digital wallet and engage in live discussions with the team around user experience, the technology powering Pocket and more.
|
Thursday, June 17, 2021
Thursday, June 17, 2021
9:00 a.m. - 10:00 a.m. | Keynote Speaker: The Time to Embed Privacy, by Design is Now, Before Mounting Surveillance Overtakes Us!Presented by: Ann Cavoukian, Ph.D. Privacy is essential — it forms the foundation of our freedom and must be preserved at all cost, now and well into the future. With surveillance mounting, we must be proactive in our privacy-protective measures, in an effort to prevent the harms from arising. That is what Privacy by Design (PbD) is all about: embedding privacy into your operations, baking it into your code so that privacy-invasive efforts can be prevented. Join the creator of Privacy by Design to learn all about the 7 Foundational Principles of PbD and start protecting privacy, right from the outset!” Ann Cavoukian, Ph.D, former 3-term Information and Privacy Commissioner of Ontario, Canada, will talk about Privacy by Design, which she created in 1997, and is now followed globally, having been translated into 40 languages. PbD applies to the changing landscape of cybersecurity, privacy, and digital trust, and the essential need to be proactive. | |
10:00 a.m. - 11:00 a.m. | Skills of the FutureModerated by: Samantha Becker, Executive Director of Creative and Communications, Arizona State University Curious what a career in Digital Trust looks like? After a brief introduction, participants can join our co-conveners, each in a different breakout room, as they share 10-minute presentations on professional digital trust skills of the future that are valuable in their organizations. Trust us, you won't want to miss these helpful insights! | |
10:00 a.m. - 11:45 a.m. | TLN Unconference 2.0 WorkshopHosted by:Kate Giovacchini, Director of Digital Trust Initiatives, University Technology Office & Michelle Watt, Product Manager and Portfolio Owner, University Technology Office Building on the groundbreaking work of the inaugural TLN Unconference of March 2020, Arizona State University invites attendees to join us in this collaborative working session to map evolutions in key distributed trust topics, utilizing the SOAR appreciative inquiry model. The rapidly evolving landscape of verifiable credentials, digital identity and distributed ledger technologies (in addition to other paradigm-shifting events of 2020!) provide us with an opportunity to examine our previous assertions, questions and assumptions and build upon them as we move forward. |
|
11:00 a.m. - 11:45 a.m. | Neighborhood Breakouts: Pick one of the multiple sessions to sit in on | |
| Data Governance 101: Higher Ed Drivers and Creating a Framework to Get StartedPresented by: The Data Governance session will focus on defining strategic objectives and requirements for data governance within Higher Education on how to: * Develop cross-functional alignment and support within the institution.* How to establish a data governance framework and methodology. * Define best practices to start up and scale a data governance program. We will also discuss how Informatica's Enterprise Data Governance solution enables a truly collaborative university-wide data governance program across the business and IT users. | |
| Cybersecurity in a Post-Pandemic World: What's Next for K-20Presented by:Hunter Ely - Higher Education Strategist, Palo Alto Networks Fadi Fadhil - K-12 Strategist, Palo Alto Networks Frank Grimmelman - President, ACTRA TJ Witucky - Director of Operations, Security, Arizona State University
During this fireside chat, presenters from Palo Alto Networks, Arizona State University and the Arizona Cyber Threat Response Alliance will highlight the emerging cybersecurity themes in both K-12 and higher education. Learn how local governments are working with education to build resilience and security throughout education in a post-pandemic environment. You’ll leave this session with strategies on how to best leverage partnerships to manage the ever-increasing threats that face public sector networks. | |
11:45 a.m. - 12:00 p.m. | Future Committing to Action + Closing |
Gold Co-convener |
Silver Co-convener | |||
|
|
| |
Community Partner | |||