Event Schedule 2019 – Tue

Please note: This schedule WILL be changing. Don't depend on precise times yet.

In week view, click on >> to go to a calendar for just that single day. You can access the schedule in these ways:
Week-at-a-Glance | Tue | Wed | Thu | Fri    |    Best Method: Subscribe to iCal Calendars

Hover over or tap on items for full description of each item.

Tue Oct 15

8 am

9 am

10 am

11 am

12 pm

1 pm

2 pm

3 pm

4 pm

5 pm

6 pm

7 pm

8 pm

9 pm

10 pm















Pre-Conference Registration 8:30 am – 9:00 am
Redondo Foyer
Pre-Conf Workshop: How to Implement Continuity of Operations, Part 1 — Avery Chipka 9:00 am – 10:30 am
Marina

At some point or another everyone experiences an interruption to operations. Disruptions come in many forms, including both natural or unnatural (aka manmade) events. This workshop will walk you through the planning and execution of continuity of operation plans. In this full-day workshop, each person will be creating a continuity of operations plan for either their own organization, or a fictional one.

The workshop will walk through both the framework and specific subtopics necessary to plan and implement continuity of operations. Included in these areas of focus are responding to network infrastructure attacks, short interruptions to power, extended power outages, proper backup techniques, issues related to staffing, failure vectors, DNS, failover systems, detecting and responding to expected failures, DOS, HostageWare, mitigation of the unexpected, and returning to either functional or normal operational status.

Pre-Conf Workshop: Setting Up a Secured Cloud Server, Part 1 — JD Strong 9:00 am – 10:30 am
Catalina

For years now, Apple has been moving away from being in the server business. Even before that, many services that Apple technologies rely on have long been better served on a Linux host. Best practices are to host these in a private or public cloud, but it’s important to do that in the right … and secure ways.

Start off with spinning up your own hosted Linux cloud server. We will lock down and secure your server with proper firewall configuration, certificate-secured secure shell access, and fail2ban implementation. With a secure server configured, we will explore hosting a website (or munki repo), VPN, File Server (Private Cloud), Unifi Controller, Email server, XMPP Chat Service, or BlueSky server (remote access). Finally, we will also configure backups of your cloud hosted server.

At the end of this session, you will have a working hosted cloud server along with a step-by-step set of instructions to set up additional servers to fit your future needs.

Pre-Conf Workshop: Swiftly Automating Systems and Workflows, Part 1 — Scott Neal 9:00 am – 10:30 am
Bay

Whether for a specific task, or scripting your system or workflow, automation is the key for admins and consultants looking to create a solution.

You may have seen automation of tasks through scripting (whether command line, Automator, AppleScript, Python, Swift, etc.), and wonder how you can better apply those concepts to your own uses. You may have even tried, but it felt daunting, or you hit roadblocks. You don’t need to be a programmer to be an effective automator. It’s all about the right approach, the right tools, and knowing where to go when you hit a roadblock.

In this workshop, you’ll get a crash course in Automation. At the end of the workshop day, you’ll know not only the basics, but you’ll have worked on your own solutions. As a hands-on workshop, you’re encouraged to bring your own ideas you want to tackle, and/or current scripts that you want to improve; we’ll work through the issues that are holding you back.

In this one-day compressed course, learn the basics of Automation using Automator, Swift, AppleScript, Command Line and Xcode.

We will also be digging into GUI development using Python-ObjC and integrating Swift with AppleScript-Cocoa. We’ll demystify the Unix Scripting Environment and Apple Events, the key to making the computer do what you want it to do.

This session won’t make you a full-blown scripter or programmer in a day, but you’ll be armed with what you need to not only work with other scripts and modify them in useful ways, but also to write your very own scripts from scratch!

Once you’ve got the “Automation Mindset” in your head, which you’ll get in this workshop, you’ll be able to see the big picture about Automation, from scripting to command line to programming (and much of what’s in between those).

Pre-Conf Workshop: Wi-Fi Security: Design and Troubleshooting, Part 1 — Jeanette Lee 9:00 am – 10:30 am
Esplanade

Most devices connect wirelessly either most or all of the time–everything from laptops to wireless thermostats, cameras, doorbells, and more. But how secure are these networks? Most people understand the basics of wireless network security but there is far more that can be done even if you don’t have the budget of the NSA.

This workshop discusses wireless security from the most common threats to the risks of state actors. No security measures are perfect but they can always be improved.

Topics that will be covered include a comparison and analysis of authentication method effectiveness from pre-shared keys to 802.1X certificate-based security, RADIUS server configuration and role-based access and wireless intrusion detection.

The goal is to provide a Wi-Fi system engineer or network manager with advanced practical and effective measures they can take to mitigate risks in their networks. Attendees should have a good grounding in wireless networking and network security.

Topics covered include:

• Everything you wanted to know about wireless security, but were afraid to ask
Review of important wireless vulnerabilities
• A critique of various authentication mechanisms: what works and what’s not worth it
• How the rest of the network contributes to wireless security or vulnerabilities
• Strategies for building a multi-layered approach to protecting critical network assets
• Troubleshooting Wi-Fi network security and some of our favorite third-party tools

Break - All Pre-Conf 10:30 am – 10:45 am
Redondo Foyer
Pre-Conf Workshop: How to Implement Continuity of Operations, Part 2 — Avery Chipka 10:45 am – 12:30 pm
Marina

At some point or another everyone experiences an interruption to operations. Disruptions come in many forms, including both natural or unnatural (aka manmade) events. This workshop will walk you through the planning and execution of continuity of operation plans. In this full-day workshop, each person will be creating a continuity of operations plan for either their own organization, or a fictional one.

The workshop will walk through both the framework and specific subtopics necessary to plan and implement continuity of operations. Included in these areas of focus are responding to network infrastructure attacks, short interruptions to power, extended power outages, proper backup techniques, issues related to staffing, failure vectors, DNS, failover systems, detecting and responding to expected failures, DOS, HostageWare, mitigation of the unexpected, and returning to either functional or normal operational status.

Pre-Conf Workshop: Setting Up a Secured Cloud Server, Part 2 — JD Strong 10:45 am – 12:30 pm
Catalina

For years now, Apple has been moving away from being in the server business. Even before that, many services that Apple technologies rely on have long been better served on a Linux host. Best practices are to host these in a private or public cloud, but it’s important to do that in the right … and secure ways.

Start off with spinning up your own hosted Linux cloud server. We will lock down and secure your server with proper firewall configuration, certificate-secured secure shell access, and fail2ban implementation. With a secure server configured, we will explore hosting a website (or munki repo), VPN, File Server (Private Cloud), Unifi Controller, Email server, XMPP Chat Service, or BlueSky server (remote access). Finally, we will also configure backups of your cloud hosted server.

At the end of this session, you will have a working hosted cloud server along with a step-by-step set of instructions to set up additional servers to fit your future needs.

Pre-Conf Workshop: Swiftly Automating Systems and Workflows, Part 2 — Scott Neal 10:45 am – 12:30 pm
Bay

Whether for a specific task, or scripting your system or workflow, automation is the key for admins and consultants looking to create a solution.

You may have seen automation of tasks through scripting (whether command line, Automator, AppleScript, Python, Swift, etc.), and wonder how you can better apply those concepts to your own uses. You may have even tried, but it felt daunting, or you hit roadblocks. You don’t need to be a programmer to be an effective automator. It’s all about the right approach, the right tools, and knowing where to go when you hit a roadblock.

In this workshop, you’ll get a crash course in Automation. At the end of the workshop day, you’ll know not only the basics, but you’ll have worked on your own solutions. As a hands-on workshop, you’re encouraged to bring your own ideas you want to tackle, and/or current scripts that you want to improve; we’ll work through the issues that are holding you back.

In this one-day compressed course, learn the basics of Automation using Automator, Swift, AppleScript, Command Line and Xcode.

We will also be digging into GUI development using Python-ObjC and integrating Swift with AppleScript-Cocoa. We’ll demystify the Unix Scripting Environment and Apple Events, the key to making the computer do what you want it to do.

This session won’t make you a full-blown scripter or programmer in a day, but you’ll be armed with what you need to not only work with other scripts and modify them in useful ways, but also to write your very own scripts from scratch!

Once you’ve got the “Automation Mindset” in your head, which you’ll get in this workshop, you’ll be able to see the big picture about Automation, from scripting to command line to programming (and much of what’s in between those).

Pre-Conf Workshop: Wi-Fi Security: Design and Troubleshooting, Part 2 — Jeanette Lee 10:45 am – 12:30 pm
Esplanade

Most devices connect wirelessly either most or all of the time–everything from laptops to wireless thermostats, cameras, doorbells, and more. But how secure are these networks? Most people understand the basics of wireless network security but there is far more that can be done even if you don’t have the budget of the NSA.

This workshop discusses wireless security from the most common threats to the risks of state actors. No security measures are perfect but they can always be improved.

Topics that will be covered include a comparison and analysis of authentication method effectiveness from pre-shared keys to 802.1X certificate-based security, RADIUS server configuration and role-based access and wireless intrusion detection.

The goal is to provide a Wi-Fi system engineer or network manager with advanced practical and effective measures they can take to mitigate risks in their networks. Attendees should have a good grounding in wireless networking and network security.

Topics covered include:

• Everything you wanted to know about wireless security, but were afraid to ask
Review of important wireless vulnerabilities
• A critique of various authentication mechanisms: what works and what’s not worth it
• How the rest of the network contributes to wireless security or vulnerabilities
• Strategies for building a multi-layered approach to protecting critical network assets
• Troubleshooting Wi-Fi network security and some of our favorite third-party tools

Lunch (only for Full Day Workshop Participants) 12:30 pm – 1:30 pm
Promenade Room on Mezanine. (From guest room elevator area, go past the front desk and turn left towards covered parking. See stairs or elevator to Mezanine level.)
Pre-Conf Workshop: How to Implement Continuity of Operations, Part 3 — Avery Chipka 1:30 pm – 3:15 pm
Marina

At some point or another everyone experiences an interruption to operations. Disruptions come in many forms, including both natural or unnatural (aka manmade) events. This workshop will walk you through the planning and execution of continuity of operation plans. In this full-day workshop, each person will be creating a continuity of operations plan for either their own organization, or a fictional one.

The workshop will walk through both the framework and specific subtopics necessary to plan and implement continuity of operations. Included in these areas of focus are responding to network infrastructure attacks, short interruptions to power, extended power outages, proper backup techniques, issues related to staffing, failure vectors, DNS, failover systems, detecting and responding to expected failures, DOS, HostageWare, mitigation of the unexpected, and returning to either functional or normal operational status.

Pre-Conf Workshop: Setting Up a Secured Cloud Server, Part 3 — JD Strong 1:30 pm – 3:15 pm
Catalina

For years now, Apple has been moving away from being in the server business. Even before that, many services that Apple technologies rely on have long been better served on a Linux host. Best practices are to host these in a private or public cloud, but it’s important to do that in the right … and secure ways.

Start off with spinning up your own hosted Linux cloud server. We will lock down and secure your server with proper firewall configuration, certificate-secured secure shell access, and fail2ban implementation. With a secure server configured, we will explore hosting a website (or munki repo), VPN, File Server (Private Cloud), Unifi Controller, Email server, XMPP Chat Service, or BlueSky server (remote access). Finally, we will also configure backups of your cloud hosted server.

At the end of this session, you will have a working hosted cloud server along with a step-by-step set of instructions to set up additional servers to fit your future needs.

Pre-Conf Workshop: Swiftly Automating Systems and Workflows, Part 3 — Scott Neal 1:30 pm – 3:15 pm
Bay

Whether for a specific task, or scripting your system or workflow, automation is the key for admins and consultants looking to create a solution.

You may have seen automation of tasks through scripting (whether command line, Automator, AppleScript, Python, Swift, etc.), and wonder how you can better apply those concepts to your own uses. You may have even tried, but it felt daunting, or you hit roadblocks. You don’t need to be a programmer to be an effective automator. It’s all about the right approach, the right tools, and knowing where to go when you hit a roadblock.

In this workshop, you’ll get a crash course in Automation. At the end of the workshop day, you’ll know not only the basics, but you’ll have worked on your own solutions. As a hands-on workshop, you’re encouraged to bring your own ideas you want to tackle, and/or current scripts that you want to improve; we’ll work through the issues that are holding you back.

In this one-day compressed course, learn the basics of Automation using Automator, Swift, AppleScript, Command Line and Xcode.

We will also be digging into GUI development using Python-ObjC and integrating Swift with AppleScript-Cocoa. We’ll demystify the Unix Scripting Environment and Apple Events, the key to making the computer do what you want it to do.

This session won’t make you a full-blown scripter or programmer in a day, but you’ll be armed with what you need to not only work with other scripts and modify them in useful ways, but also to write your very own scripts from scratch!

Once you’ve got the “Automation Mindset” in your head, which you’ll get in this workshop, you’ll be able to see the big picture about Automation, from scripting to command line to programming (and much of what’s in between those).

Pre-Conf Workshop: Wi-Fi Security: Design and Troubleshooting, Part 3 — Jeanette Lee 1:30 pm – 3:15 pm
Esplanade

Most devices connect wirelessly either most or all of the time–everything from laptops to wireless thermostats, cameras, doorbells, and more. But how secure are these networks? Most people understand the basics of wireless network security but there is far more that can be done even if you don’t have the budget of the NSA.

This workshop discusses wireless security from the most common threats to the risks of state actors. No security measures are perfect but they can always be improved.

Topics that will be covered include a comparison and analysis of authentication method effectiveness from pre-shared keys to 802.1X certificate-based security, RADIUS server configuration and role-based access and wireless intrusion detection.

The goal is to provide a Wi-Fi system engineer or network manager with advanced practical and effective measures they can take to mitigate risks in their networks. Attendees should have a good grounding in wireless networking and network security.

Topics covered include:

• Everything you wanted to know about wireless security, but were afraid to ask
Review of important wireless vulnerabilities
• A critique of various authentication mechanisms: what works and what’s not worth it
• How the rest of the network contributes to wireless security or vulnerabilities
• Strategies for building a multi-layered approach to protecting critical network assets
• Troubleshooting Wi-Fi network security and some of our favorite third-party tools

Break - All Pre-Conf 3:15 pm – 3:30 pm
Redondo Foyer

11/6/18

Pre-Conf Workshop: How to Implement Continuity of Operations, Part 4 — Avery Chipka 3:30 pm – 5:00 pm
Marina

At some point or another everyone experiences an interruption to operations. Disruptions come in many forms, including both natural or unnatural (aka manmade) events. This workshop will walk you through the planning and execution of continuity of operation plans. In this full-day workshop, each person will be creating a continuity of operations plan for either their own organization, or a fictional one.

The workshop will walk through both the framework and specific subtopics necessary to plan and implement continuity of operations. Included in these areas of focus are responding to network infrastructure attacks, short interruptions to power, extended power outages, proper backup techniques, issues related to staffing, failure vectors, DNS, failover systems, detecting and responding to expected failures, DOS, HostageWare, mitigation of the unexpected, and returning to either functional or normal operational status.

Pre-Conf Workshop: Setting Up a Secured Cloud Server, Part 4 — JD Strong 3:30 pm – 5:00 pm
Catalina

For years now, Apple has been moving away from being in the server business. Even before that, many services that Apple technologies rely on have long been better served on a Linux host. Best practices are to host these in a private or public cloud, but it’s important to do that in the right … and secure ways.

Start off with spinning up your own hosted Linux cloud server. We will lock down and secure your server with proper firewall configuration, certificate-secured secure shell access, and fail2ban implementation. With a secure server configured, we will explore hosting a website (or munki repo), VPN, File Server (Private Cloud), Unifi Controller, Email server, XMPP Chat Service, or BlueSky server (remote access). Finally, we will also configure backups of your cloud hosted server.

At the end of this session, you will have a working hosted cloud server along with a step-by-step set of instructions to set up additional servers to fit your future needs.

Pre-Conf Workshop: Swiftly Automating Systems and Workflows, Part 4 — Scott Neal 3:30 pm – 5:00 pm
Bay

Whether for a specific task, or scripting your system or workflow, automation is the key for admins and consultants looking to create a solution.

You may have seen automation of tasks through scripting (whether command line, Automator, AppleScript, Python, Swift, etc.), and wonder how you can better apply those concepts to your own uses. You may have even tried, but it felt daunting, or you hit roadblocks. You don’t need to be a programmer to be an effective automator. It’s all about the right approach, the right tools, and knowing where to go when you hit a roadblock.

In this workshop, you’ll get a crash course in Automation. At the end of the workshop day, you’ll know not only the basics, but you’ll have worked on your own solutions. As a hands-on workshop, you’re encouraged to bring your own ideas you want to tackle, and/or current scripts that you want to improve; we’ll work through the issues that are holding you back.

In this one-day compressed course, learn the basics of Automation using Automator, Swift, AppleScript, Command Line and Xcode.

We will also be digging into GUI development using Python-ObjC and integrating Swift with AppleScript-Cocoa. We’ll demystify the Unix Scripting Environment and Apple Events, the key to making the computer do what you want it to do.

This session won’t make you a full-blown scripter or programmer in a day, but you’ll be armed with what you need to not only work with other scripts and modify them in useful ways, but also to write your very own scripts from scratch!

Once you’ve got the “Automation Mindset” in your head, which you’ll get in this workshop, you’ll be able to see the big picture about Automation, from scripting to command line to programming (and much of what’s in between those).

Pre-Conf Workshop: Wi-Fi Security: Design and Troubleshooting, Part 4 — Jeanette Lee 3:30 pm – 5:00 pm
Esplanade

Most devices connect wirelessly either most or all of the time–everything from laptops to wireless thermostats, cameras, doorbells, and more. But how secure are these networks? Most people understand the basics of wireless network security but there is far more that can be done even if you don’t have the budget of the NSA.

This workshop discusses wireless security from the most common threats to the risks of state actors. No security measures are perfect but they can always be improved.

Topics that will be covered include a comparison and analysis of authentication method effectiveness from pre-shared keys to 802.1X certificate-based security, RADIUS server configuration and role-based access and wireless intrusion detection.

The goal is to provide a Wi-Fi system engineer or network manager with advanced practical and effective measures they can take to mitigate risks in their networks. Attendees should have a good grounding in wireless networking and network security.

Topics covered include:

• Everything you wanted to know about wireless security, but were afraid to ask
Review of important wireless vulnerabilities
• A critique of various authentication mechanisms: what works and what’s not worth it
• How the rest of the network contributes to wireless security or vulnerabilities
• Strategies for building a multi-layered approach to protecting critical network assets
• Troubleshooting Wi-Fi network security and some of our favorite third-party tools

Spoke Party! for MacTech Conference Attendees 5:00 pm – 6:30 pm
Promenade Room on Mezanine. (From guest room elevator area, go past the front desk and turn left towards covered parking. See stairs or elevator to Mezanine level.)

Come meet theSpoketeam, and enjoy drinks and appetizers! You not only can find out more about IT Kit, but also meet new people. It’s a great way to also see who wants to go out to dinner (after the IT Kit Happy Hour), and there’s a number of places walking distance from the hotel to choose from!
 Looking for cool places online to meet and read about other IT pros? Check out itkit.io . The site is run by Spoke, the ticketing platform used by today’s forward-thinking IT team. Ask us more about the site and IT Kit when you meet our team; drinks on Spoke!