Event Schedule 2019 – Week

Please note: This schedule WILL be changing. Don't depend on precise times yet.

In week view, click on >> to go to a calendar for just that single day. You can access the schedule in these ways:
Week-at-a-Glance | Tue | Wed | Thu | Fri    |    Best Method: Subscribe to iCal Calendars

Hover over or tap on items for full description of each item.

Expand/Collapse Tue Oct 15 Expand/Collapse Wed Oct 16 Expand/Collapse Thu Oct 17 Expand/Collapse Fri Oct 18

7 am

8 am

9 am

10 am

11 am

12 pm

1 pm

2 pm

3 pm

4 pm

5 pm

6 pm

7 pm

8 pm

9 pm

10 pm
















Pre-Conference Registration 8:30 am – 9:00 am
Redondo Foyer
Pre-Conf Workshop: How to Implement Continuity of Operations, Part 1 — Avery Chipka 9:00 am – 10:30 am
Marina

At some point or another everyone experiences an interruption to operations. Disruptions come in many forms, including both natural or unnatural (aka manmade) events. This workshop will walk you through the planning and execution of continuity of operation plans. In this full-day workshop, each person will be creating a continuity of operations plan for either their own organization, or a fictional one.

The workshop will walk through both the framework and specific subtopics necessary to plan and implement continuity of operations. Included in these areas of focus are responding to network infrastructure attacks, short interruptions to power, extended power outages, proper backup techniques, issues related to staffing, failure vectors, DNS, failover systems, detecting and responding to expected failures, DOS, HostageWare, mitigation of the unexpected, and returning to either functional or normal operational status.

Pre-Conf Workshop: Setting Up a Secured Cloud Server, Part 1 — JD Strong 9:00 am – 10:30 am
Catalina

For years now, Apple has been moving away from being in the server business. Even before that, many services that Apple technologies rely on have long been better served on a Linux host. Best practices are to host these in a private or public cloud, but it’s important to do that in the right … and secure ways.

Start off with spinning up your own hosted Linux cloud server. We will lock down and secure your server with proper firewall configuration, certificate-secured secure shell access, and fail2ban implementation. With a secure server configured, we will explore hosting a website (or munki repo), VPN, File Server (Private Cloud), Unifi Controller, Email server, XMPP Chat Service, or BlueSky server (remote access). Finally, we will also configure backups of your cloud hosted server.

At the end of this session, you will have a working hosted cloud server along with a step-by-step set of instructions to set up additional servers to fit your future needs.

Pre-Conf Workshop: Swiftly Automating Systems and Workflows, Part 1 — Scott Neal 9:00 am – 10:30 am
Bay

Whether for a specific task, or scripting your system or workflow, automation is the key for admins and consultants looking to create a solution.

You may have seen automation of tasks through scripting (whether command line, Automator, AppleScript, Python, Swift, etc.), and wonder how you can better apply those concepts to your own uses. You may have even tried, but it felt daunting, or you hit roadblocks. You don’t need to be a programmer to be an effective automator. It’s all about the right approach, the right tools, and knowing where to go when you hit a roadblock.

In this workshop, you’ll get a crash course in Automation. At the end of the workshop day, you’ll know not only the basics, but you’ll have worked on your own solutions. As a hands-on workshop, you’re encouraged to bring your own ideas you want to tackle, and/or current scripts that you want to improve; we’ll work through the issues that are holding you back.

In this one-day compressed course, learn the basics of Automation using Automator, Swift, AppleScript, Command Line and Xcode.

We will also be digging into GUI development using Python-ObjC and integrating Swift with AppleScript-Cocoa. We’ll demystify the Unix Scripting Environment and Apple Events, the key to making the computer do what you want it to do.

This session won’t make you a full-blown scripter or programmer in a day, but you’ll be armed with what you need to not only work with other scripts and modify them in useful ways, but also to write your very own scripts from scratch!

Once you’ve got the “Automation Mindset” in your head, which you’ll get in this workshop, you’ll be able to see the big picture about Automation, from scripting to command line to programming (and much of what’s in between those).

Pre-Conf Workshop: Wi-Fi Security: Design and Troubleshooting, Part 1 — Jeanette Lee 9:00 am – 10:30 am
Esplanade

Most devices connect wirelessly either most or all of the time–everything from laptops to wireless thermostats, cameras, doorbells, and more. But how secure are these networks? Most people understand the basics of wireless network security but there is far more that can be done even if you don’t have the budget of the NSA.

This workshop discusses wireless security from the most common threats to the risks of state actors. No security measures are perfect but they can always be improved.

Topics that will be covered include a comparison and analysis of authentication method effectiveness from pre-shared keys to 802.1X certificate-based security, RADIUS server configuration and role-based access and wireless intrusion detection.

The goal is to provide a Wi-Fi system engineer or network manager with advanced practical and effective measures they can take to mitigate risks in their networks. Attendees should have a good grounding in wireless networking and network security.

Topics covered include:

• Everything you wanted to know about wireless security, but were afraid to ask
Review of important wireless vulnerabilities
• A critique of various authentication mechanisms: what works and what’s not worth it
• How the rest of the network contributes to wireless security or vulnerabilities
• Strategies for building a multi-layered approach to protecting critical network assets
• Troubleshooting Wi-Fi network security and some of our favorite third-party tools

Break - All Pre-Conf 10:30 am – 10:45 am
Redondo Foyer
Pre-Conf Workshop: How to Implement Continuity of Operations, Part 2 — Avery Chipka 10:45 am – 12:30 pm
Marina

At some point or another everyone experiences an interruption to operations. Disruptions come in many forms, including both natural or unnatural (aka manmade) events. This workshop will walk you through the planning and execution of continuity of operation plans. In this full-day workshop, each person will be creating a continuity of operations plan for either their own organization, or a fictional one.

The workshop will walk through both the framework and specific subtopics necessary to plan and implement continuity of operations. Included in these areas of focus are responding to network infrastructure attacks, short interruptions to power, extended power outages, proper backup techniques, issues related to staffing, failure vectors, DNS, failover systems, detecting and responding to expected failures, DOS, HostageWare, mitigation of the unexpected, and returning to either functional or normal operational status.

Pre-Conf Workshop: Setting Up a Secured Cloud Server, Part 2 — JD Strong 10:45 am – 12:30 pm
Catalina

For years now, Apple has been moving away from being in the server business. Even before that, many services that Apple technologies rely on have long been better served on a Linux host. Best practices are to host these in a private or public cloud, but it’s important to do that in the right … and secure ways.

Start off with spinning up your own hosted Linux cloud server. We will lock down and secure your server with proper firewall configuration, certificate-secured secure shell access, and fail2ban implementation. With a secure server configured, we will explore hosting a website (or munki repo), VPN, File Server (Private Cloud), Unifi Controller, Email server, XMPP Chat Service, or BlueSky server (remote access). Finally, we will also configure backups of your cloud hosted server.

At the end of this session, you will have a working hosted cloud server along with a step-by-step set of instructions to set up additional servers to fit your future needs.

Pre-Conf Workshop: Swiftly Automating Systems and Workflows, Part 2 — Scott Neal 10:45 am – 12:30 pm
Bay

Whether for a specific task, or scripting your system or workflow, automation is the key for admins and consultants looking to create a solution.

You may have seen automation of tasks through scripting (whether command line, Automator, AppleScript, Python, Swift, etc.), and wonder how you can better apply those concepts to your own uses. You may have even tried, but it felt daunting, or you hit roadblocks. You don’t need to be a programmer to be an effective automator. It’s all about the right approach, the right tools, and knowing where to go when you hit a roadblock.

In this workshop, you’ll get a crash course in Automation. At the end of the workshop day, you’ll know not only the basics, but you’ll have worked on your own solutions. As a hands-on workshop, you’re encouraged to bring your own ideas you want to tackle, and/or current scripts that you want to improve; we’ll work through the issues that are holding you back.

In this one-day compressed course, learn the basics of Automation using Automator, Swift, AppleScript, Command Line and Xcode.

We will also be digging into GUI development using Python-ObjC and integrating Swift with AppleScript-Cocoa. We’ll demystify the Unix Scripting Environment and Apple Events, the key to making the computer do what you want it to do.

This session won’t make you a full-blown scripter or programmer in a day, but you’ll be armed with what you need to not only work with other scripts and modify them in useful ways, but also to write your very own scripts from scratch!

Once you’ve got the “Automation Mindset” in your head, which you’ll get in this workshop, you’ll be able to see the big picture about Automation, from scripting to command line to programming (and much of what’s in between those).

Pre-Conf Workshop: Wi-Fi Security: Design and Troubleshooting, Part 2 — Jeanette Lee 10:45 am – 12:30 pm
Esplanade

Most devices connect wirelessly either most or all of the time–everything from laptops to wireless thermostats, cameras, doorbells, and more. But how secure are these networks? Most people understand the basics of wireless network security but there is far more that can be done even if you don’t have the budget of the NSA.

This workshop discusses wireless security from the most common threats to the risks of state actors. No security measures are perfect but they can always be improved.

Topics that will be covered include a comparison and analysis of authentication method effectiveness from pre-shared keys to 802.1X certificate-based security, RADIUS server configuration and role-based access and wireless intrusion detection.

The goal is to provide a Wi-Fi system engineer or network manager with advanced practical and effective measures they can take to mitigate risks in their networks. Attendees should have a good grounding in wireless networking and network security.

Topics covered include:

• Everything you wanted to know about wireless security, but were afraid to ask
Review of important wireless vulnerabilities
• A critique of various authentication mechanisms: what works and what’s not worth it
• How the rest of the network contributes to wireless security or vulnerabilities
• Strategies for building a multi-layered approach to protecting critical network assets
• Troubleshooting Wi-Fi network security and some of our favorite third-party tools

Lunch (only for Full Day Workshop Participants) 12:30 pm – 1:30 pm
Promenade Room on Mezanine. (From guest room elevator area, go past the front desk and turn left towards covered parking. See stairs or elevator to Mezanine level.)
Pre-Conf Workshop: How to Implement Continuity of Operations, Part 3 — Avery Chipka 1:30 pm – 3:15 pm
Marina

At some point or another everyone experiences an interruption to operations. Disruptions come in many forms, including both natural or unnatural (aka manmade) events. This workshop will walk you through the planning and execution of continuity of operation plans. In this full-day workshop, each person will be creating a continuity of operations plan for either their own organization, or a fictional one.

The workshop will walk through both the framework and specific subtopics necessary to plan and implement continuity of operations. Included in these areas of focus are responding to network infrastructure attacks, short interruptions to power, extended power outages, proper backup techniques, issues related to staffing, failure vectors, DNS, failover systems, detecting and responding to expected failures, DOS, HostageWare, mitigation of the unexpected, and returning to either functional or normal operational status.

Pre-Conf Workshop: Setting Up a Secured Cloud Server, Part 3 — JD Strong 1:30 pm – 3:15 pm
Catalina

For years now, Apple has been moving away from being in the server business. Even before that, many services that Apple technologies rely on have long been better served on a Linux host. Best practices are to host these in a private or public cloud, but it’s important to do that in the right … and secure ways.

Start off with spinning up your own hosted Linux cloud server. We will lock down and secure your server with proper firewall configuration, certificate-secured secure shell access, and fail2ban implementation. With a secure server configured, we will explore hosting a website (or munki repo), VPN, File Server (Private Cloud), Unifi Controller, Email server, XMPP Chat Service, or BlueSky server (remote access). Finally, we will also configure backups of your cloud hosted server.

At the end of this session, you will have a working hosted cloud server along with a step-by-step set of instructions to set up additional servers to fit your future needs.

Pre-Conf Workshop: Swiftly Automating Systems and Workflows, Part 3 — Scott Neal 1:30 pm – 3:15 pm
Bay

Whether for a specific task, or scripting your system or workflow, automation is the key for admins and consultants looking to create a solution.

You may have seen automation of tasks through scripting (whether command line, Automator, AppleScript, Python, Swift, etc.), and wonder how you can better apply those concepts to your own uses. You may have even tried, but it felt daunting, or you hit roadblocks. You don’t need to be a programmer to be an effective automator. It’s all about the right approach, the right tools, and knowing where to go when you hit a roadblock.

In this workshop, you’ll get a crash course in Automation. At the end of the workshop day, you’ll know not only the basics, but you’ll have worked on your own solutions. As a hands-on workshop, you’re encouraged to bring your own ideas you want to tackle, and/or current scripts that you want to improve; we’ll work through the issues that are holding you back.

In this one-day compressed course, learn the basics of Automation using Automator, Swift, AppleScript, Command Line and Xcode.

We will also be digging into GUI development using Python-ObjC and integrating Swift with AppleScript-Cocoa. We’ll demystify the Unix Scripting Environment and Apple Events, the key to making the computer do what you want it to do.

This session won’t make you a full-blown scripter or programmer in a day, but you’ll be armed with what you need to not only work with other scripts and modify them in useful ways, but also to write your very own scripts from scratch!

Once you’ve got the “Automation Mindset” in your head, which you’ll get in this workshop, you’ll be able to see the big picture about Automation, from scripting to command line to programming (and much of what’s in between those).

Pre-Conf Workshop: Wi-Fi Security: Design and Troubleshooting, Part 3 — Jeanette Lee 1:30 pm – 3:15 pm
Esplanade

Most devices connect wirelessly either most or all of the time–everything from laptops to wireless thermostats, cameras, doorbells, and more. But how secure are these networks? Most people understand the basics of wireless network security but there is far more that can be done even if you don’t have the budget of the NSA.

This workshop discusses wireless security from the most common threats to the risks of state actors. No security measures are perfect but they can always be improved.

Topics that will be covered include a comparison and analysis of authentication method effectiveness from pre-shared keys to 802.1X certificate-based security, RADIUS server configuration and role-based access and wireless intrusion detection.

The goal is to provide a Wi-Fi system engineer or network manager with advanced practical and effective measures they can take to mitigate risks in their networks. Attendees should have a good grounding in wireless networking and network security.

Topics covered include:

• Everything you wanted to know about wireless security, but were afraid to ask
Review of important wireless vulnerabilities
• A critique of various authentication mechanisms: what works and what’s not worth it
• How the rest of the network contributes to wireless security or vulnerabilities
• Strategies for building a multi-layered approach to protecting critical network assets
• Troubleshooting Wi-Fi network security and some of our favorite third-party tools

Break - All Pre-Conf 3:15 pm – 3:30 pm
Redondo Foyer

11/6/18

Pre-Conf Workshop: How to Implement Continuity of Operations, Part 4 — Avery Chipka 3:30 pm – 5:00 pm
Marina

At some point or another everyone experiences an interruption to operations. Disruptions come in many forms, including both natural or unnatural (aka manmade) events. This workshop will walk you through the planning and execution of continuity of operation plans. In this full-day workshop, each person will be creating a continuity of operations plan for either their own organization, or a fictional one.

The workshop will walk through both the framework and specific subtopics necessary to plan and implement continuity of operations. Included in these areas of focus are responding to network infrastructure attacks, short interruptions to power, extended power outages, proper backup techniques, issues related to staffing, failure vectors, DNS, failover systems, detecting and responding to expected failures, DOS, HostageWare, mitigation of the unexpected, and returning to either functional or normal operational status.

Pre-Conf Workshop: Setting Up a Secured Cloud Server, Part 4 — JD Strong 3:30 pm – 5:00 pm
Catalina

For years now, Apple has been moving away from being in the server business. Even before that, many services that Apple technologies rely on have long been better served on a Linux host. Best practices are to host these in a private or public cloud, but it’s important to do that in the right … and secure ways.

Start off with spinning up your own hosted Linux cloud server. We will lock down and secure your server with proper firewall configuration, certificate-secured secure shell access, and fail2ban implementation. With a secure server configured, we will explore hosting a website (or munki repo), VPN, File Server (Private Cloud), Unifi Controller, Email server, XMPP Chat Service, or BlueSky server (remote access). Finally, we will also configure backups of your cloud hosted server.

At the end of this session, you will have a working hosted cloud server along with a step-by-step set of instructions to set up additional servers to fit your future needs.

Pre-Conf Workshop: Swiftly Automating Systems and Workflows, Part 4 — Scott Neal 3:30 pm – 5:00 pm
Bay

Whether for a specific task, or scripting your system or workflow, automation is the key for admins and consultants looking to create a solution.

You may have seen automation of tasks through scripting (whether command line, Automator, AppleScript, Python, Swift, etc.), and wonder how you can better apply those concepts to your own uses. You may have even tried, but it felt daunting, or you hit roadblocks. You don’t need to be a programmer to be an effective automator. It’s all about the right approach, the right tools, and knowing where to go when you hit a roadblock.

In this workshop, you’ll get a crash course in Automation. At the end of the workshop day, you’ll know not only the basics, but you’ll have worked on your own solutions. As a hands-on workshop, you’re encouraged to bring your own ideas you want to tackle, and/or current scripts that you want to improve; we’ll work through the issues that are holding you back.

In this one-day compressed course, learn the basics of Automation using Automator, Swift, AppleScript, Command Line and Xcode.

We will also be digging into GUI development using Python-ObjC and integrating Swift with AppleScript-Cocoa. We’ll demystify the Unix Scripting Environment and Apple Events, the key to making the computer do what you want it to do.

This session won’t make you a full-blown scripter or programmer in a day, but you’ll be armed with what you need to not only work with other scripts and modify them in useful ways, but also to write your very own scripts from scratch!

Once you’ve got the “Automation Mindset” in your head, which you’ll get in this workshop, you’ll be able to see the big picture about Automation, from scripting to command line to programming (and much of what’s in between those).

Pre-Conf Workshop: Wi-Fi Security: Design and Troubleshooting, Part 4 — Jeanette Lee 3:30 pm – 5:00 pm
Esplanade

Most devices connect wirelessly either most or all of the time–everything from laptops to wireless thermostats, cameras, doorbells, and more. But how secure are these networks? Most people understand the basics of wireless network security but there is far more that can be done even if you don’t have the budget of the NSA.

This workshop discusses wireless security from the most common threats to the risks of state actors. No security measures are perfect but they can always be improved.

Topics that will be covered include a comparison and analysis of authentication method effectiveness from pre-shared keys to 802.1X certificate-based security, RADIUS server configuration and role-based access and wireless intrusion detection.

The goal is to provide a Wi-Fi system engineer or network manager with advanced practical and effective measures they can take to mitigate risks in their networks. Attendees should have a good grounding in wireless networking and network security.

Topics covered include:

• Everything you wanted to know about wireless security, but were afraid to ask
Review of important wireless vulnerabilities
• A critique of various authentication mechanisms: what works and what’s not worth it
• How the rest of the network contributes to wireless security or vulnerabilities
• Strategies for building a multi-layered approach to protecting critical network assets
• Troubleshooting Wi-Fi network security and some of our favorite third-party tools

Spoke Party! for MacTech Conference Attendees 5:00 pm – 6:30 pm
Promenade Room on Mezanine. (From guest room elevator area, go past the front desk and turn left towards covered parking. See stairs or elevator to Mezanine level.)

Come meet theSpoketeam, and enjoy drinks and appetizers! You not only can find out more about IT Kit, but also meet new people. It’s a great way to also see who wants to go out to dinner (after the IT Kit Happy Hour), and there’s a number of places walking distance from the hotel to choose from!
 Looking for cool places online to meet and read about other IT pros? Check out itkit.io . The site is run by Spoke, the ticketing platform used by today’s forward-thinking IT team. Ask us more about the site and IT Kit when you meet our team; drinks on Spoke!

















7am Event - Floating 7:00 am – 8:00 am
Seascape
Talk to Event Sponsors, Collect Raffle Tickets, and More. 8:00 am – 5:00 pm
Seascape
Breakfast Break 8:00 am – 10:00 am
Seascape
Conference Registration 8:00 am – 10:00 am
Redondo 1
Welcome — Neil Ticktin 10:45 am – 11:00 am
Pacific Ballroom

MacTech Conference 2019 Host, Neil Ticktin, welcomes everyone, and lays out what’s going to happen for the week.

Keynote: That's amazing! Why Storytelling is Crucial to Tech, Business, and the World — Scott Knaster 11:00 am – 11:50 am
Pacific Ballroom
Best Practices: IT's Role in Delivering an Awesome Employee Experience — Naveen Pitchandi 11:15 am – 11:45 am
Pacific Ballroom

Every company knows you have to treat your customers right if you want to succeed. But organizations are realizing these days that the experience they provide their employees can have a massive impact on their ability to compete. The employee experience has become so important a factor, that it can affect critical business drivers like customer satisfaction, product quality, speed to market, etc. IT departments have an increasingly important role to play in the employee experience, which gives admins an opportunity to make a real difference to their organization, or client organizations.

Lunch 12:20 pm – 1:50 pm
Sol via Seascape
Looking Ahead: What Matters in Apple Device Management — Charles Edge 1:45 pm – 2:35 pm
Pacific Ballroom

Sometimes when you sit down to write the outline of a book, you spend most of your time analyzing trends first before you start to write anything. In other words, you build a story and then you articulate that story. In our latest book, A Unified Theory of Apple Device Management, we spent a lot of time trying to figure out what matters and what doesn’t matter in the Apple space. Contrast that approach with previous books where we’re documenting what’s been done. By analyzing trends and having perspective, you start to realize just how things have changed and what matters, what doesn’t matter, what’s a solved problem, what’s completely come off the table, and most importantly you start finding ways to future-proof the devices and rubrics you’ve built to support those devices. In this session, we’ll jump right on into that and look at WHAT we saw in our analysis, and WHY we decided to structure the book the way we did: as a lens to look into our reality … a representation of where we’re spending our time in our day jobs, and where we think we will over the coming few years.

QuickTalk: Fleetsmith — Zack Blum 2:30 pm – 2:35 pm
Looking at macOS Storage with 2020 Vision — Tim Standing 3:00 pm – 3:45 pm
Pacific Ballroom

This past couple of years has seen a ton of change in storage, with Apple’s rollout of APFS. That all continues to evolve, and during this next year, we will see many changes in the storage on macOS. For example, there will be the introduction of a read-only system volume, the introduction of U2 devices and faster PCIe storage cards and many significant advances in storage software. This talk will dive into these new technologies to navigate storage and help you use and prepare to adopt those technologies which are appropriate for your organization.

QuickTalk: Spoke — 3:45 pm – 3:55 pm
Break 3:55 pm – 4:25 pm
Seascape
Watch Me Pull an Install Out of My Hat — Phil Goodman and Ben Levy 4:25 pm – 5:05 pm
Pacific Ballroom

Monolithic imaging is a parrot on its back at the bottom of its cage. macOS has moved on and the new term is provisioning. Using startosinstall, the Apple workflow for APFS devices to streamline deployment is incredibly powerful, customizable, portable and yet, disarmingly simple! You can install macOS, firmware updates, OS updates, a variety of packages, Profiles and scripts and achieve the kind of results that will make you shake your head at those who lament the loss of imaging. A single USB Flash or SSD drive can be used to start a wipe, OS install and installation of all necessary apps and packages for full customization in minutes without a server. Taking this even further with the open source TwoCanoes’ MDS, you can distribute USB drives to IT Staff (or even use the Two Canoes USB Automaton) to completely automate the process while you contemplate the unladen weight of a sparrow.

Dinner 5:00 pm – 6:00 pm
Harbor Terrace, 2nd Level
Get Ready for Dinner & Evening Excursion: Grab Jacket! 5:05 pm – 5:15 pm
An Evening of Technology, Water and Wonder: Aquarium of the Pacific 6:00 pm – 10:00 pm
Front of Hotel to Load Buses

An Evening of Technology, Water and Wonder
On Wednesday evening of MacTech Conference, we’ll be headed to the Aquarium of the Pacific to not only see this new wing, and the technology behind it, but the wonders this renowned aquarium brings. There will be both organized tours, as well as you can wander on your own in groups with special stations the Aquarium is putting together just for MacTech Conference attendees.

Earlier this year, Southern California saw the opening of an amazing technological achievement showcasing one of our worlds great wonders — the new wing of the Aquarium of the Pacific called “Pacific Visions”. In addition to more space, Pacific Visions houses a state-of-the-art immersive theater giving visitors the ability to “explore our relationship with our planet and alternative pathways to the future using the latest technology.”

With over 11,000 animals in 50 different exhibits, the Aquarium of the Pacific is the largest in Southern California—and the nation’s fifth largest overall. With over a million visitors each year, this Long Beach, CA aquarium Los Angeles’ third largest cultural attraction.

Even the Pacific Visions building itself is an impressive accomplishment in technology, architecture, and green building. From its complex glass-panel façade to its award winning environmental and sustainable design, Pacific Visions was conceived as an example of what aquariums could be in the future. It integrates “elements of science centers, arts venues, and museums to explore solutions to our world’s biggest challenges, including climate change and its impacts.”

















Breakfast 8:00 am – 9:00 am
Sol via Seascape
Throughout Day: Talk to Sponsors, Get Raffle Tickets, and More. 8:00 am – 5:30 pm
Writing and Understanding AutoPkg Recipes — Anthony Reimer 9:00 am – 9:50 am
Pacific Ballroom

If you use AutoPkg (with or without AutoPkgr), you will have inevitably found that one of the pieces of software you deploy is not covered by a public AutoPkg recipe, or perhaps there is a download recipe but not a child recipe that you require for your management system (e.g., .pkg, .jss, .filewave). Even if you only write the occasional recipe, you still need to know how to read recipes to effectively implement trust verification. In this session, we will break down the AutoPkg recipe format, discuss the various types of recipes (parent, child, stub, override), teach you the various ways you can write a recipe (e.g., copying another recipe, Recipe Robot, new-recipe verb), discuss basic debugging techniques, offer some (opinionated) suggestions on how best to write your recipe chains, and examine the various Microsoft Office recipes as a case study on different approaches to writing AutoPkg recipes.

You're under attack. What are your first steps? — Avery Chipka 9:00 am – 9:50 am
Pensinula Ballroom

In this day and age, everyone from the Fortune 500 company to small business to even home users is a target for network intrusions. This session will introduce you to the first steps to take, when you become the victim of a targeted attack. We will cover first steps for both Blue Team (Defensive) and Red Team (Offensive) counter measures to limit the damage caused by the intrusion and digital evidence preservation for post incident investigation. In this session, we’ll talk about preparation you can take before attacks happen, attack prevention and defenses, and post incident procedures. We’ll touch on review and penetration testing procedures.

JPL HoloLens Missions 9:00 am – 5:00 pm
QuickTalk: JumpCloud — Zach DeMeyer 9:50 am – 10:00 am
Peninsula Ballroom
QuickTalk: Parallels — Kurt Schmucker 9:50 am – 10:00 am
A Technologist's Guide to Telecom, VoIP, and Acronym Laden Services — David Mercer 10:00 am – 10:50 am
Pacific Ballroom

Most, if not all, IT Pros and consultants at one point or another have been asked about “phone service.” Whether using older terms like VoIP, or the current names like Unified Communications, UCaaS, CCaaS, etc… the essence of today’s telecom services is, more than ever, related to what IT does. More so, the services are converging with what we all do. In this session, we’ll go through the most important terms used today, endpoint options, device choices, and even the types of configuration deployment tools. We’ll cover about integration, collaboration products, network needs and performance. We’ll discuss areas of concern including remote offices, connectivity, configuration for robustness (including SD-WAN, MPLS and the place for VPNs). In the end, you’ll be armed with what you need to know as an IT Pro looking to do the right thing for your organization, or a consultant looking to take care of your clients.

Going API with FileMaker — Alex Narvey 10:00 am – 10:50 am
Pensinula Ballroom

Using FileMaker’s scripting and API capabilities to forge tools that integrate various web/cloud services to enhance workflows. In this session, we will look at how FileMaker can interact with REST APIs to both update websites and to have websites update FileMaker. After laying the groundwork we will showcase three successful in-house tools: a FileMaker tool to automate Dark Web Scanning and generate fully formatted PDF summary reports for clients; a FileMaker tool to automate the gathering of domain and SSL expiration info and automatically populate a Watchman Monitoring Dashboard all at the click of a button; and a FileMaker tool to replace GUI functionality that Apple deprecated and then removed from macOS Server; – in just a few seconds. We will also look at the API integration capabilities of the new Claris Connect.

QuickTalk: Omni Group — Ken Case 10:50 am – 10:55 am
Pensinula Ballroom
QuickTalk: FileWave — Avery Thomas 10:50 am – 10:55 am
Break 10:55 am – 11:25 am
Seascape
Wi-Fi 6: What to Expect and Why You Should Care — Jeanette Lee 11:25 am – 12:15 pm
Pensinula Ballroom (NOW IN PACIFIC)

A new year. A new Wi-Fi standard. Wi-Fi 6, also known as 802.11ax, is shipping but do you really need it? Join us for a hearty bowl of Wi-Fi alphabet soup and a critique of how and when you can benefit from investing in the latest networking standard.

Private Cloud, Virtualization, and More: Making the Most of Today's NAS — Dave Hamilton 11:25 am – 12:15 pm
Pensinula Ballroom

NAS has long been thought about as storage – after all, it’s in the name: Networked Attached Storage (NAS). But what you really have with NAS is another computer on your network, and that computer can be used for private cloud (host your own Dropbox!), virtualization, media management (Plex and iTunes streaming), backup (including Time Machine), chat server, file sharing, and more. In this session, we’ll talk about the types of differentiators to look for when selecting a NAS, as well as specific ways to implement some of the more popular and useful features and engines to make the most of your network.

QuickTalk: Jamf — Christopher Eames 12:15 pm – 12:25 pm
Peninsula Ballroom
QuickTalk: Watchman Monitoring — Jack-Daniyel Strong 12:15 pm – 12:20 pm
Random Lunch Tables (Buffet) 12:25 pm – 1:55 pm
Sol via Seascape
Apple's New Security Policies: Impact on Enterprise — Leon Lincoln 1:55 pm – 2:50 pm
Pacific Ballroom

Welcome to the next generation of Security Policies! Have you thought about what you need to be aware of before you roll out macOS 10.15 or iOS 10.13? With Apple’s latest OSes, the kernel is basically untouchable, kext popups will confront users, and app access to devices. This session will dive into these and many more issues, while giving your Enterprise users the experience you’d like them to have.

Mac Troubleshooting: Success with a View — John Kirn 1:55 pm – 2:50 pm
Pensinula Ballroom

While having an arsenal of Mac troubleshooting techniques is great, being able to quickly assess where to start is an equally valuable skill. We often make things more complicated than they are, and everyone has a story about how a simple fix created chaos. This session breaks down a variety of Mac problems, and shows how applying different viewpoints to each benefits the decision-making process. Based on these proven concepts, one can make sense of Mac issues quicker, and start off with a clearer perspective. In addition to real life support examples, this session also includes a few unique approaches to common Mac troubleshooting situations.

QuickTalk: IBM — Phil Hall 2:50 pm – 2:55 pm
Peninsula Ballroom
Python, Apple, and You — Greg Neagle 3:00 pm – 3:50 pm
Pacific Ballroom

Apple has long shipped Python 2 with macOS, and it’s become a favorite tool of Mac admins — used for many popular Mac admin tools. With Python 2’s end-of-life coming in January 2020, Apple has announced that a future version of macOS will no longer include Python by default. For those that use Python, you will probably need to do something new! You might need to install Python yourself, you might need to convert scripts to Python 3, or you might need to move to Swift or some other language for some tools you depend on. In this session, we’ll discuss what you can do to adapt and survive changes with Python and from Apple.

Revolutionize Your Database Performance by Thinking in Today's Terms — Jim Rea 3:00 pm – 3:50 pm
Pensinula Ballroom

Databases are one of computing’s oldest uses – and yet, today’s databases often follow some design principles dated well back into the 1970’s. With today’s hardware, and the explosion in RAM on even the most basic of computers, there’s no reason to continue to handcuff capabilities, and performance. In-memory database technology is now being adopted by some of the largest players in this market, including Oracle, Microsoft, IBM and SAP, as well as newcomers like RedisSQL, MemSQL, VoltDB and others. It’s clear that if you’re willing to think differently about your approach, you can actually get something that’s far, far more capable while shedding the vast majority of overhead and database size. In this talk, we’ll look at different ways to take advantage of memory technology in database applications, from simple tricks that will give you some benefit without much effort today, to hybrid approaches that will give you more benefits. We’ll then talk about how completely re-thinking your approach will allow you build superfast, vastly smaller databases with the most capability. With a modern approach, you’ll see the types of usage that you’ve always wanted, but never really considered with a handcuffed design. In the end, you’ll walk away with immediately implementable performance gains, and we’ll help open your mind to new approaches that will release the true power of your databases.

Afternoon Break 3:55 pm – 4:25 pm
Seascape
An Insider's Look at APU — Sal Soghoian 4:25 pm – 5:15 pm
Pacific Ballroom

Automation legend Sal Soghoian will give an insider’s look at Apple Provisioning Utility, it’s advancement and explosive growth. You’ll hear about how organizations in all fields and industries are integrating mobile devices as mission-critical appliances, and deploying them to staff and clients. You’ll find out how the Apple Provisioning Utility (APU) can deliver robust onsite management of mobile devices using a simple plug-and-go process. We’ll examine the practical aspects of incorporating a shared-use device strategy. You’ll learn how to use and customize APU to address a wide variety of deployment scenarios: from business, education and professional services, to healthcare and retail team support.

Security Insights and Perspective — Josh Long 4:25 pm – 5:15 pm
Pensinula Ballroom

Josh has had a long history in Security as a renowned security researcher and writer. And as Intego’s Chief Security Analyst, he’s continued his path of research in Information Security. Come hear Josh’s insights on today’s security issues — you’ll likely walk away with a different perspective than you may have had in the past.

Challenge DIscussion: Getting Started as MacAdmin — Ben Levy and Phil Goodman 5:20 pm – 6:00 pm
Marina

Led by Phil Goodman and Ben Levy, here’s your chance to discuss getting started as an Apple sysadmin with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions!

Challenge DIscussion: Munki — Greg Neagle 5:20 pm – 6:00 pm
Peninsula

Led by Greg Neagle, here’s your chance to discuss Munki with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions!

Challenge DIscussion: Security — Edward Marczak and Josh Long 5:20 pm – 6:00 pm
Pacific Ballroom

Led by Ed Marczak, here’s your chance to discuss security with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions!

Challenge DIscussion: Support Desk Systems — Jack-Daniyel Strong 5:20 pm – 6:00 pm
Bay

Led by JD Strong, here’s your chance to discuss help desk systems with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions!

Challenge DIscussion: Wi-Fi — Jeanette Lee 5:20 pm – 6:00 pm
Esplanade

Led by Jeanette Lee, here’s your chance to discuss Wi-Fi with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions!

Challenge Discussion: Debugging and Troubleshooting — John Kirn 5:20 pm – 6:00 pm
Catalina

Led by John Kirn, here’s your chance to discuss debugging and troubleshooting with subject matter experts in the room. Bring your challenges for group discussions and hopefully suggestions!

Dinner & Conf Party! 6:15 pm – 7:15 pm
Seaside Lagoon: Outside front of Hotel Towards Water
TidBITS TechUp — Adam Engst 6:15 pm – 7:15 pm
Seaside Lagoon: Outside front of Hotel Towards Water

Test your Apple knowledge against your peers in the TidBITS TechUp, the interactive game show. Created by Adam and Tonya Engst of TidBITS, the TechUp features a wide range of questions about Apple products and services across the company’s history. Everyone can participate. Will you make it to the final round?

Walk to Retro Party: Arcade, Air Hockey Competition, and more! 7:15 pm – 7:30 pm
Conference Party! 7:30 pm – 10:00 pm
















Breakfast 8:00 am – 9:00 am
Sol
Throughout Day: Business Technologies Showcase, Last Chance to Collect Raffle Tickets 8:00 am – 4:00 pm
Seascape
Best Practices: Troubleshooting and Debugging Scripts — Sean Colins 9:00 am – 9:50 am
Pacific Ballroom

Shell scripts are often used to run commands in a collection all at once commonly for some kind of systems administration work. This is unlike coding in Swift, .NET, C++ or other programming languages which are typically used to write applications for users. Admins often find themselves learning the ins and outs of shell scripting to solve problems that are repetitive, ensuring proper execution of actions on systems that might be hard to do en masse, remotely, by other people. Whether bash, C shell, zsh or other shells, writing scripts is a lot like programming or coding. As coders say, 90% of coding is debugging, and the same is true of scripting. Probably 90% of getting your script just right involves debugging or troubleshooting your scripts. In this session, we’ll cover how to set yourself up right for success from the start, useful script editor features, how to enable logging techniques, report error conditions, and best ways to use code already written. By the end of this session you will be much better prepared to write and debug your own scripts for any use.

Business Automation: More than Just at Home — Scott Neal 9:00 am – 9:50 am
Pensinula Ballroom

Apple has several products that they position for home automation–but what about outside the home? Can a business effectively use AppleTV, Apple Watch, and other technologies to improve the worlds of Enterprise, small business, education, or non-profits? We’re going to talk about Apple’s tvOS and HomeKit development environments, and the power that developers have that has yet to be unleashed in many current products. In the last year, Apple has made significant updates to tvOS and watchOS. In this session, we’re going to look at the aspects of Apple’s solutions that make business automation interesting. We’ll look at both both off-the-shelf and custom solutions within the session that take the ideas out of the documentation and bring into real life.

bash-fully moving to zsh — Jack-Daniyel Strong 9:50 am – 10:40 am
Pacific Ballroom

Apple has made it clear that bash will not be installed by default on an operating system at some point in the future, and that the future “standard” on macOS Catalina is zsh — Z Shell. In this session, we’ll review the similarities and differences of Apple’s new default shell environment compared to the current one (bash). You’ll see what you need to do on a future macOS if you still need bash, but it’s not installed. We will highlight some of the new features zsh brings and explore the many resources available in fandom already in place and dedicated to this shell environment (zsh). Most importantly, what the well established zsh community brings to the Mac platform.

AI, Emerging Tech and the Law — Morvareed Salehpour 9:50 am – 10:40 am
Pensinula Ballroom

In this session, we’ll be discussing the legal implications of the latest emerging technologies, including AI, including how to address issues with jurisdiction, liability, releases and contracts with respect to disputes that arise involving such advances. Specifically, as the real-world begins to use these emerging technologies, what are the ramifications in responsibility, liability, and more that we should be thinking about, both as producers and users of these new technologies.

Break 10:40 am – 11:10 am
Seascape
Incident Response in the Post-Catalina World — Thomas Reed 11:10 am – 12:00 pm
Pacific Ballroom

Incident Response – the process of responding to an infection, to learn what was done and how to identify the threat throughout your organization – is a constantly changing and evolving challenge. Not only to the threats evolve, but systems, apps, and underlying technologies change — and responders have to not just what to manage, but how as well. With the release of Catalina, and announcements of things to come in future versions of macOS, Incident Response (IR) has some fairly significant transitions and adjustments to make. The future removal of scripting languages from the standard system installations will eliminate many current IR tools. And, changes to Transparency, Consent, and Control (TCC) make the job of collecting data more difficult. In this session, we’ll learn how IR works, and how adjustments can allow it to continue to work in the post-Catalina world. We’ll also look at how we make a set of decisions in choosing what underlying scripting and query technologies to use – which will be useful in updating other tools.

What’s New in Security & MDM in macOS Catalina — Jesse Endahl 11:10 am – 12:00 pm
Pensinula Ballroom

This talk will cover all that’s new with regard to security in macOS Catalina, including changes related to MDM such as Activation Lock. Additional topics will include Gatekeeper/Notarization, new data protection improvements (TCC), the new read only system volume, new requirements for certificate trust, and more.

Lunch & Table Discussions 12:00 pm – 1:30 pm
Sol via Seascape
Thinking Problems All The Way Through: Holistic Systems, Autonomy and Mars — Sandy Krasner 1:30 pm – 2:20 pm
Pacific Ballroom

There is a 14 minute communication lag between the Earth and Mars. When we send a rover/lander to Mars, landings must therefore be autonomous — there’s no time for corrections, tweaks or decisions from Earth. The first Mars landers had a target area of 250 square miles — an area so large, it’s fraught with danger. Mars 2020 will target an area of less than 16 square miles which is tiny by comparison. In this session, Sandy will explore how JPL/NASA goes about giving the lander these capabilities through computer vision, logic, and a holistic approach that’s useful not just in space exploration, but in so many complex systems today.

(Security) Research to Improve the World — Edward Marczak 2:20 pm – 3:10 pm
Pacific Ballroom

This talk will speak to those who are curious about security research, research teams, and how their techniques can help you become a better technologist. We’ll cover what is security research? How does research work with a larger organization? What values are important to research? Most importantly, we’ll talk about how you can get started and weave these lessons into your work whether you are an IT Pro or a consultant.

Final Coffee Break 3:10 pm – 3:35 pm
Seascape
EndNote: Creating the Ultimate Set of Control Panels — Sal Soghoian 3:35 pm – 4:35 pm
Pacific Ballroom

In macOS Catalina, we get new capabilities that allow us to use our traditional, and familiar, systems and devices in totally new and exciting ways. If we combine those new capabilities with automation, underlying system events, and more, we can create and customize the most sophisticated and capable of “control panels” and controllers for macOS. The possibilities are endless, the productivity gains could be enormous, and all with incredible flexibility. In this ‘EndNote,’ automation legend Sal Soghoian will work his automation magic and help your expand your mind to all the new possibilities.

Goodies, Raffles, and Closing 4:30 pm – 5:00 pm
Pacific