Abstracts

 

Smarter Distributed Working with Office 365
Nick Skelton, Independent IT Consultant

Since the pandemic universities have realised the importance of IT communication platforms and the infrastructure staff who run them. But without help organisations simply mirror their old practices into new tools, replacing face to face meetings with back-to-back Zoom fatigue. IT professionals understand the potential of tools like Office 365, and can light the spark of revolution. But only through working across the university can we achieve it. With Estates and Digital Education we will embed AV tech across the campus. With HR we can create new digital etiquettes and practices. Together we will change our universities for the better.

 

Eat, Sleep, Remote, Repeat
Alex Goffe, ICT Services Manager; David Hughes, Information Security Analyst; and Gary Lloyd, Infrastructure Manager, Keele University

How Keele University is building resilient services for staff and students and overcoming its technical debt. The session will cover moving to O365, Cloud Services, Identity Management, and engagement with the wider University.

 

Beyond IaaS; Robust architectures and security models for  cloud native technologies
Josh Fry, Director of Cloud, Jisc

Cloud technology providers are keen to describe a shared security model, with the emphasis on responsibility divided between supplier and consumer. But as with any other security model, accountability for security remains with the institution.  Applying traditional security methodologies and architectural models to Cloud native technologies – such as function / event-driven serverless computing, micro service architectures, containerisation, CI/CD etc.  plus migrating and integrating with SaaS environments, could leave institutions open to potential weaknesses and / or not exploiting Cloud native technologies to their full advantage. This talk will examine the topic of beyond IaaS:  What institutions need to be putting in place to ensure  they have the best architectures  and security models for the next phase of their cloud adoption, and have confidence in being able to take advantage of future cloud technologies.