2018 Spring PD

Friday, May 11, 2018 

Registration Opens at 8:30 AM

Sessions run from 9 to 3:00

$40.00 (Includes Lunch)


Mt Pleasant is the primary location.

Oakland ISD and Copper Country ISD are Remote Video Links.


The registration period has closed for this event.


Registration open through 5/11/2018 11:59 PM

Registrations Available: 379


Vendors Note: MAEDS is only open to K12 School employees. You may apply to attend the fall conference, please watch the MAEDS website for the Vendor application to appear soon.


*You may cancel your registration for full refund up to the Friday before the event.

Event Details



Session List - Registration Begins at 8:30 AM

AM Sessions - 9 to 11:30


PM Sessions - 12:00 to 3:00

AM Sessions


Security on a Shoestring Part 1 - Starting Your Security Program

Part 1 of this 2-part series will review basic cybersecurity methodologies from identity and access management, setting up risk and cybersecurity management, utilizing industry standard frameworks, crafting effective policies, standards, and procedures.

Topics include:

  • Identity and password management
  • Implementing a Risk Management program within your organization
  • Achieving your cybersecurity goals by utilizing scanning tools and software hardening documents
  • Crafting and structuring a policies, standards and procedures


Making the shift from VMWare to Microsoft Hyper-V


  • Compare features between the two platforms
  • Migrating and converting Virtual Machines
  • Extending management through System Center Virtual Machine Manager (VMM)
  • Planning & Design and Training opportunities with Microsoft credits

PM Sessions


Security on a Shoestring Part 2 - Using Open Source Tools and Intelligence: 'See What the Bad Guys See'

Part 2 of this series focus on using various Open Source tools for vulnerability and web application scanning, using Open Source Intelligence to your advantage and other free resources your organization can take advantage of.

Topics include:

  • Using both graphical and command line tools to detect vulnerabilities within your environment
  • Setting up alerts using free or low cost tools to keep an eye on your network
  • The use of openly available tools to gain network intelligence
    Information sharing and free resources

Getting started with a Public Cloud Infrastructure


  • Overview of Microsoft Azure and Amazon Web Services
  • Public Cloud Reference architectures
  • Iaas or PaaS?
  • Common services and use cases
    Common mistakes and pitfalls to avoid


Share This

About Us