Technically Speaking is the Technology Services speaking series. Previously known as IT Forum, the series encourages professional development and shares intriguing content from relevant speakers.
Technically Speaking events offer expert presentations on a variety of important information technology topics. Speakers vary from Texas A&M University leaders to nationally recognized leaders outside of the University.
You will now receive continuing education credits for attending these events.
Most Recent Event
Upcoming Events
- June 25 @ 1:30 PM - Zoom webinar - Real Use, Real Insight: Maximize the Impact of User Experience Testing
Ensure successful IT product and service launches by understanding and implementing effective user experience testing. This presentation will equip you with the essential 'why' and practical 'how' behind building a solid user experience test strategy. Drawing on the Product Management Teams’ recent real-world experiences, we'll share invaluable best practices, point out critical missteps to avoid, and provide actionable tips to ensure your tests deliver maximum value. By the end, you'll understand the critical importance of user experience, testing, have a roadmap for implementation, and feel confident in your ability to test products effectively moving forward.
Register for TrainTraq course #2114902, section #12001.
Past Events
- April 22 – Kyle Field Press Box – Security Hackathon with Elastic & 1Password
Join us at the Kyle Field Press Box for a full day of hands-on security challenges, technical deep dives, and expert-led discussions. Elastic will kick things off with a workshop on using their product for server monitoring and alerts, while 1Password will showcase how to protect SSH keys and leverage secrets management tools for developers and engineers using their APIs, CLI, and container sidecar solutions. Throughout the day, you'll have opportunities to sharpen your security skills, learn best practices, and connect with industry experts. We'll wrap up the event with an exciting Capture The Flag (CTF) competition hosted by Elastic—so come ready to test your skills and compete for bragging rights!
No registration required—just show up when you can, stay as long as you like, and join us for as much as you're able.
Cyber Hackathon Schedule
9:00–9:45 AM – 🔐 1Password: SSH Key Management & Advanced Platform Usage
Learn how to protect SSH keys and strengthen your credential hygiene using 1Password's advanced capabilities.10:00 AM–12:00 PM – 🏆 Elastic Capture the Flag (CTF)
Test your skills in a gamified threat detection and response scenario using Elastic's security stack. Solve real-world challenges and compete for bragging rights!1:30–2:30 PM – 📊 Elastic Observability Workshop
Explore how to use AI-powered insights to monitor system metrics, track infrastructure health, and simulate user experience with synthetic monitoring.3:00–4:00 PM – 🔑 1Password: Secrets Management for Developers & Engineers
Dive into 1Password's developer tools, including their Secrets CLI, APIs, and container sidecar solution for securely managing secrets in CI/CD workflows. - March 26th | 1:30 PM – Zoom webinar – Technically Speaking: Cloud Vulnerabilities and You (Patching Your Cloud Environments)
"Cloud Vulnerabilities and You – Patching Your Cloud Environments" will explore the unique security challenges of cloud-based systems and the critical role of patch management in mitigating risks. We’ll discuss common cloud vulnerabilities, how they differ from on-prem threats, and best practices for keeping your cloud environments secure. This session will cover practical approaches to vulnerability detection, automated patching, and compliance considerations across various cloud platforms. Whether you manage cloud infrastructure or rely on cloud services, you’ll gain valuable insights to help strengthen your cloud security strategy.
- February 19 | 10:30 AM – Zoom webinar – Securing Your Systems: CVE Management and Vulnerability Assessment
Join us for ‘Securing Your Systems: CVE Management and Vulnerability Assessment,’ where we’ll explore how to effectively identify, prioritize, and remediate vulnerabilities across your systems. This session will focus on the Common Vulnerabilities and Exposures (CVE) system, offering practical insights into managing security risks at scale. We’ll also walk through the vulnerability assessment process, highlighting tools, best practices, and real-world examples to help you strengthen your security posture. Whether you’re a seasoned IT professional or new to vulnerability management, this talk will provide actionable strategies to keep your systems secure and resilient.