<?xml version="1.0"?>
<News hasArchived="true" page="18" pageCount="19" pageSize="10" timestamp="Sun, 26 Apr 2026 16:22:27 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=18">
<NewsItem contentIssues="true" id="72825" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72825">
<Title>UMBC faculty, alumni and partners discuss cybersecurity and industry challenges</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2017/12/CyberPressEvent_3.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/12/CyberPressEvent_3.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1><strong>UMBC faculty, alumni and corporate partners discuss cybersecurity and industry challenges</strong></h1>
    <p>Cybersecurity is regularly a headliner in the news, especially when personal information stored online has been compromised, whether through a breach, hack, or threat. On Thursday, December 7, UMBC hosted experts from industry and academia at the National Press Club to discuss the cyber challenges professionals face, and how those groups can work together to prepare future generations of cybersecurity professionals.</p>
    <p>Scott Shane, a reporter with <em>The New York Times</em>, led the discussion with five panelists representing industry, small business, and higher education. “I think it’s fair to say the internet was built without adequate attention to security,” stated Shane, who writes about cyber and information attacks regularly. “It’s almost like somebody who starts a bank with branches all over the world, and after it’s up and running and has millions of account holders, suddenly starts to think about safes, locks on the doors and bulletproof glass. I think that’s sort of the stage that we’re at right now.”</p>
    <p>UMBC President <strong>Freeman Hrabowski </strong>and <strong>Anupam Joshi</strong>, professor and chair of computer science and electrical engineering, and director of the Center for Cybersecurity at UMBC, were joined by alumni and partners who have been working on the challenge of educating the workforce together. Hrabowski explained that there are currently about 350,000 unfilled cybersecurity jobs, and that number is expected to continue to grow. By 2021, it is anticipated that there will be approximately three million job openings in cyber-related fields.</p>
    <p>Over the course of his professional career, Nigel Faulkner, chief technology officer at T. Rowe Price, has experienced the emergence of technology and many changes. “As the CTO of a medium-large company, cyber is a defensive investment for us. The best thing that can happen is nothing happens,” Faulkner said, adding that he is always thinking about whether the company is investing enough, doing the right thing, and making the right connections in the industry to keep clients’ information safe.</p>
    <p>As president and founder of TCecure, LLC, and cybersecurity academic innovation officer for University System of Maryland (USM), <strong>Tina Williams</strong> ’02, computer science, shared the importance of building security into technology from the beginning, rather than adding these features on at the “tail end of a development cycle.” Not only does her company handle security, they also monitor threats and risks that can compromise the technology’s health. In her role at USM, Williams represents the system as a whole to integrate academia and academic research, relationships, and resources into what’s taking place nationally, at the Federally Funded Research and Development Centers.</p>
    <p>As head of UMBC’s Center for Cybersecurity, Joshi explained that UMBC is combating these national challenges by partnering with industry and government leaders to conduct research that addresses specific real-world needs that benefit both. Collaborative relationships, such as UMBC’s work with Northrop Grumman and T. Rowe Price, is one way that UMBC is working to cultivate the next generation of cybersecurity talent.</p>
    <p>As an alumna of UMBC and a current employee at Northrop Grumman, <strong>Lauren Mazzoli </strong>’15, computer science and mathematics, M.S. ’17, computer science, a systems engineer in the Future Technical Leaders Program at Northrop Grumman, discussed her experience in the Cyber Scholars Program. The Cyber Scholars Program works to increase the participation of women and underrepresented minorities in the field. Mazzoli explained that her experience at UMBC, in the Cyber Scholars Program, and working alongside mentors on and off-campus led her to be involved with continuing to encourage women to pursue careers in cybersecurity. “For me it’s been a product of the relationship between academia and industry, that have allowed me to find my own career path, and at the same time help others find theirs,” she explained, noting her passion for helping students consider careers in cybersecurity and related fields.</p>
    <p>“We know there’s a huge workforce that we need and we can’t fill that pipeline. So yes, we need more women, yes, we need students of all backgrounds, but we need diversity of thought, experience, education, and problem-solving skills,” said Mazzoli, adding that it is important for students to know from a young age that cybersecurity is a field they can pursue.</p>
    <p><em>Adapted from a <a href="http://news.umbc.edu/umbc-faculty-alumni-and-corporate-partners-discuss-cybersecurity-and-industry-challenges/" rel="nofollow external" class="bo">UMBC News article</a> article written by <a href="https://oia.umbc.edu/about-us/our-team/person/zr66298/" rel="nofollow external" class="bo">Megan Hanks</a> Photo by Abnet Shiferaw ’11, visual arts. </em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/12/umbc-faculty-alumni-and-partners-discuss-cybersecurity-and-industry-challenges/" rel="nofollow external" class="bo">UMBC faculty, alumni and partners discuss cybersecurity and industry challenges</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    UMBC faculty, alumni and corporate partners discuss cybersecurity and industry challenges   Cybersecurity is regularly a headliner in the news, especially when personal information stored...</Summary>
<Website>https://www.csee.umbc.edu/2017/12/umbc-faculty-alumni-and-partners-discuss-cybersecurity-and-industry-challenges/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72825/guest@my.umbc.edu/dfa76de7478d788248e005724b8a3d28/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 14 Dec 2017 20:39:18 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72610" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72610">
<Title>National Press Club Event: Rise to Dominance of Cybersecurity Challenges</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p> </p>
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2017/12/npc_dc.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/12/npc_dc.png" alt="" width="1000" height="524" style="max-width: 100%; height: auto;"></a></p>
    <h1>National Press Club Event: Rise to Dominance of Cybersecurity Challenges</h1>
    <p>Join UMBC and industry and government experts for a panel on how cybersecurity touches our everyday lives and how journalists can engage a wide range of readers in cybersecurity news. This panel will touch on topics ranging from online commerce to national conversations about security leaks. It will also explore how to best prepare the next generation of cybersecurity leaders to effectively tackle the challenges we are facing.</p>
    <p>Thursday, 7 December 2017, 4:00-6:00pm<br><a href="https://www.press.org/" rel="nofollow external" class="bo">National Press Club</a>, Washington, D.C.<br>
    Light refreshments will be served.</p>
    <p><a href="https://t.e2ma.net/click/4nuoq/sascxp/cmmzmf" rel="nofollow external" class="bo">Registration</a> by December 4 preferred.</p>
    <p>Moderator: New York Times reporter <a href="https://www.nytimes.com/by/scott-shane" rel="nofollow external" class="bo"><strong>Scott Shane</strong></a></p>
    <p>Featured panelists include:</p>
    <ul><li><strong>Freeman A. Hrabowski</strong>, III, UMBC President</li>
    <li><strong>Nigel Faulkner</strong>, CIO, T. Rowe Price</li>
    <li><strong>Anupam Joshi</strong>, Director, UMBC Center for Cybersecurity; Professor and Chair, Department of Computer Science and Electrical Engineering</li>
    <li><strong>Lauren Mazzoli</strong> ’15, M.S ’17, Systems Engineer, Future Technical Leaders Program, Northrop Grumman Corporation</li>
    <li><strong>Tina Williams</strong> ’02, President, TCecure, LLC; Cybersecurity Academic Innovation Officer for University System of Maryland</li>
    </ul><p>Contact Candace Dodson-Reed at *protected email* with questions.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/12/national-press-club-event-rise-dominance-cybersecurity-challenges-umbc/" rel="nofollow external" class="bo">National Press Club Event: Rise to Dominance of Cybersecurity Challenges</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>       National Press Club Event: Rise to Dominance of Cybersecurity Challenges   Join UMBC and industry and government experts for a panel on how cybersecurity touches our everyday lives and how...</Summary>
<Website>https://www.csee.umbc.edu/2017/12/national-press-club-event-rise-dominance-cybersecurity-challenges-umbc/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72610/guest@my.umbc.edu/e5172ceea6bcf644bd9f3a74da32e36c/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 01 Dec 2017 23:02:03 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72611" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72611">
<Title>talk: PKI in the Defense Information Systems Agency, 12-1 Fri 12/1, ITE228</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h3> <a href="https://www.csee.umbc.edu/wp-content/uploads/2017/11/OOOYQZKVG5H2ND4AWEFLHPVBZU.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/11/OOOYQZKVG5H2ND4AWEFLHPVBZU-1024x536.jpg" alt="" width="1024" height="536" style="max-width: 100%; height: auto;"></a></h3>
    <h3>UMBC Cyber Defense Lab</h3>
    <h1><strong>PKI in the Defense Information Systems Agency (DISA)</strong></h1>
    <h1>Phil Scheffler</h1>
    <h2>Chief Engineer – Joint Enablers<br>
    ID2 – Cyber Development Directorate<br>
    Defense Information Systems Agency</h2>
    <h3>12:00–1pm, Dec 1, 2017, ITE 228</h3>
    <p>As a combat support agency within the Department of Defense, DISA faces unlimited challenges with Public-Key Infrastructure (PKI). Chief Engineer Phil Scheffler will shed some light on DoD PKI at the Defense Information Systems Agency (DISA), and challenges deploying PKI across such a large enterprise.</p>
    <p>Philip Scheffler is the Chief Engineer for the ID2 Joint Enablers Division in DISA’s Cyber Development Directorate. He joined DISA in 2010 as an NSA Information Assurance Scholar on the Public Key Enablement team. Over the past 7 years, Phil has been the technical lead for various PKI initiatives for the DoD. Mr. Scheffler has a B.A. in Economics from Brandeis University and a M.S in Computer Science from Boston University.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/11/umbc-talk-pki-defense-information-systems-agency/" rel="nofollow external" class="bo">talk: PKI in the Defense Information Systems Agency, 12-1 Fri 12/1, ITE228</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    UMBC Cyber Defense Lab   PKI in the Defense Information Systems Agency (DISA)   Phil Scheffler   Chief Engineer – Joint Enablers  ID2 – Cyber Development Directorate  Defense Information...</Summary>
<Website>https://www.csee.umbc.edu/2017/11/umbc-talk-pki-defense-information-systems-agency/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72611/guest@my.umbc.edu/56139280fe936ae540e898bc5ad6771f/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 29 Nov 2017 21:37:22 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72612" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72612">
<Title>talk: An Introduction to Quantum Cryptography, Noon Friday 11/17, ITE231</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h4><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/11/quantum_crypto.jpeg" style="max-width: 100%; height: auto;"></h4>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1><strong>An Introduction to Quantum Cryptography:</strong><br><strong>Or, How Alice Outwits Eve</strong></h1>
    <h3>Sam Lomonaco, CSEE, UMBC<br>
    12:00–1:00pm, Friday, 17 November 2017, ITE 231, UMBC</h3>
    <p>Alice and Bob wish to communicate without the archvillainess Eve eavesdropping on their conversation. Alice decides to take two college courses, one in cryptography, the other in quantum mechanics. During the courses, she discovers she can use what she has learned to devise a cryptographic communication system that automatically detects whether or not Eve is up to her villainous eavesdropping. Some of the topics discussed are Heisenberg’s Uncertainty Principle, the Vernam cipher, the BB84 and B92 cryptographic protocols. The talk ends with a discussion of some of Eve’s possible eavesdropping strategies, i.e., opaque eavesdropping, translucent eavesdropping, and translucent eavesdropping with entanglement.</p>
    <p><a href="https://www.csee.umbc.edu/~lomonaco/" rel="nofollow external" class="bo">Samuel J. Lomonaco Jr</a>. received his PhD in mathematics from Princeton University. He has been a full professor of computer science and electrical engineering at the University of Maryland, Baltimore County (UMBC) since 1985, serving as founding chair of the CS Department from 1985 to 1991. Representative Awards, Accomplishments, and Honors include: (1) He was a visiting key research scientist at the Mathematical Sciences Research Institute (MSRI) at the University of California at Berkley in 2004. (2) He was a senior LaGrange fellow at the Institute for Scientific Exchange in Torino, Italy in 2005. (3) For contributions made to the development of the programming language Ada, he received an award from the United States Under Secretary of Defense for Research and Engineering, Dr. Richard DeLauer. (4) He was the first to introduce quantum information science to the American Mathematical Society (AMS) by organizing and giving a two-day AMS short course on quantum computation at the Annual Meeting of the AMS in Washington, DC, in January 2000. (5) He published four books on quantum computation and information science. (6) He accepted an invitation to be a guest editor of the Journal of Quantum Information Processing for a special issue on topological quantum computation.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/11/umbc-introduction-quantum-cryptography-lomonaco/" rel="nofollow external" class="bo">talk: An Introduction to Quantum Cryptography, Noon Friday 11/17, ITE231</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   An Introduction to Quantum Cryptography: Or, How Alice Outwits Eve   Sam Lomonaco, CSEE, UMBC  12:00–1:00pm, Friday, 17 November 2017, ITE 231, UMBC   Alice...</Summary>
<Website>https://www.csee.umbc.edu/2017/11/umbc-introduction-quantum-cryptography-lomonaco/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72612/guest@my.umbc.edu/54e3ce4738d132a9095207c57d198708/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 15 Nov 2017 08:10:40 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72613" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72613">
<Title>talk: A Practitioner&#8217;s Introduction to Deep Learning, 1pm Fri 11/17</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/11/deep_learning.png" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>ACM Tech Talk Series</h4>
    <h1><strong>​A Practitioner’s Introduction to Deep Learning</strong></h1>
    <h3>​Ashwin Kumar Ganesan, PhD student</h3>
    <h3>1:00-2:00pm Friday, 17 November 2017​, ITE325, UMBC</h3>
    <p>In recent years, Deep Neural Networks have been highly successful at performing a number of tasks in computer vision, natural language processing and artificial intelligence in general. The remarkable performance gains have led to universities and industries investing heavily in this space. This investment creates a thriving open source ecosystem of tools &amp; libraries that aid the design of new architectures, algorithm research as well as data collection.</p>
    <p>This talk (and hands-on session) introduce people to some of the basics of machine learning, neural networks and discusses some of the popular neural network architectures. We take a dive into one of the popular libraries, Tensorflow, and an associated abstraction library Keras.</p>
    <p>To participate in the hands-on aspects of the workshop, bring a laptop computer with Python installed and install the following libraries using pip.  For windows or (any other OS) consider doing an installation of anaconda that has all the necessary libraries.</p>
    <ul><li>numpy, scipy &amp; scikit-learn</li>
    <li>tensorflow / tensoflow-gpu (The first one is the GPU version)</li>
    <li>matplotlib for visualizations (if necessary)</li>
    <li>jupyter &amp; ipython (We will use python2.7 in our experiments)</li>
    </ul><p>Following are helpful links:</p>
    <ul><li><a href="https://www.tensorflow.org/install/" rel="nofollow external" class="bo">https://www.tensorflow.org/install/</a></li>
    <li><a href="https://www.scipy.org/install.html" rel="nofollow external" class="bo">https://www.scipy.org/install.html</a></li>
    </ul><p>Contact Nisha Pillai (NPillai1 at umbc.edu) with any questions regarding this event.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/11/practitioner-introduction-deep-learning-umbc-acm-teck-talk/" rel="nofollow external" class="bo">talk: A Practitioner’s Introduction to Deep Learning, 1pm Fri 11/17</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>ACM Tech Talk Series   ​A Practitioner’s Introduction to Deep Learning   ​Ashwin Kumar Ganesan, PhD student   1:00-2:00pm Friday, 17 November 2017​, ITE325, UMBC   In recent years, Deep Neural...</Summary>
<Website>https://www.csee.umbc.edu/2017/11/practitioner-introduction-deep-learning-umbc-acm-teck-talk/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72613/guest@my.umbc.edu/e6c0244a9107e67e192737ee9aca6200/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Nov 2017 14:56:17 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72614" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72614">
<Title>talk: Winning NCCDC, and its practicality in the real world, 12pm 11/3, ITE231</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/11/Cyber-Dawgs_2-e1492460144449-1920x768-1.jpg" style="max-width: 100%; height: auto;"></p>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1><strong>Winning NCCDC, and its practicality in the real world</strong></h1>
    <h3>Bryan Vanek, CSEE, UMBC</h3>
    <h3>12:00noon–1pm Friday, 3 November 2017, ITE 231</h3>
    <p>The National Collegiate Cyber Defense Competition (NCCDC) takes place every year and gives students an environment where they can develop understanding and operational competency in managing and protecting corporate network infrastructure and business information systems. Competitors participate as the blue team, and try to protect their machines from being infiltrated by the red team, while simultaneously keeping critical services up and running in order for a mock business to stay up and running. After an immense amount of preparation and strife, the UMBC Cyber Defense Team took home its first national title for the competition this year. But what exactly did the team do to prepare for this competition? What exactly happened at the different stages of the competition? And just how practical are these situations in the real world? One of the winning team members will be covering these questions in this week’s CDL, so we hope to see you there!</p>
    <p>Bryan Vanek is a UMBC undergraduate computer science major and mathematics minor. In addition to being one of the winning team members for NCCDC, he is currently serving as the president for the UMBC Cyber Defense Team, and is a CWIT T-SITE scholar. He currently works at Interclypse Inc. as a security engineer and software developer, and has had multiple internships and jobs dealing with aspects of computer development and security. Most recently he has completed his second internship at the Department of Defense  in the Summer Internship Program for Information Assurance. Upon graduation he will be returning to the DoD as a member of the Computer Network Operations development Program.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/11/talk-winning-nccdc-and-its-practicality-in-the-real-world-umbc-national-collegiate-cyber-defense-competition/" rel="nofollow external" class="bo">talk: Winning NCCDC, and its practicality in the real world, 12pm 11/3, ITE231</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Winning NCCDC, and its practicality in the real world   Bryan Vanek, CSEE, UMBC   12:00noon–1pm Friday, 3 November 2017, ITE 231   The National Collegiate...</Summary>
<Website>https://www.csee.umbc.edu/2017/11/talk-winning-nccdc-and-its-practicality-in-the-real-world-umbc-national-collegiate-cyber-defense-competition/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72614/guest@my.umbc.edu/2df3bde02c8ee6cbd28f3eb7cc49260a/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 02 Nov 2017 22:16:56 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72615" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72615">
<Title>Open House: UMBC Graduate Cybersecurity and Data Science Programs, 6-7:30 Wed. 10/25</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/header.png" style="max-width: 100%; height: auto;"></p>
    <h1>Open House: UMBC Graduate Professional Programs</h1>
    <p>The Fall <a href="http://www.umbc.edu/openhouse/" rel="nofollow external" class="bo">Open House</a> for UMBC Professional Programs, including the graduate programs on Cybersecurity and Data Science, takes place this coming Wednesday evening, 25 October 2017, at BWTECH South (<a href="https://goo.gl/HYNjP7" rel="nofollow external" class="bo">map</a>) from 6:00-7:30pm.</p>
    <p>Students interested in pursuing such programs (MPS degrees and/or certificates) or just to learn more about the field are encouraged to register and attend. Current students interested in pursuing a BS/MPS option for selected programs (such as Cybersecurity or Data Science) are especially welcome.</p>
    <p>Attendees who apply to start in Spring 18 will have their UMBC application fee waived.</p>
    <p>The programs represented include:</p>
    <ul><li><a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">Cybersecurity</a></li>
    <li><a href="http://datascience.umbc.edu/" rel="nofollow external" class="bo">Data Science</a></li>
    <li><a href="http://www.umbc.edu/engm/" rel="nofollow external" class="bo">Engineering Management</a></li>
    <li><a href="http://www.umbc.edu/se/" rel="nofollow external" class="bo">Systems Engineering</a></li>
    <li><a href="http://www.umbc.edu/hit/" rel="nofollow external" class="bo">Health Information Technology</a></li>
    <li><a href="http://www.umbc.edu/isd/" rel="nofollow external" class="bo">Instructional Systems Development</a></li>
    </ul><p>Program directors for these programs will present in individual breakout sessions and relevant support staff from DPS, the UMBC Graduate School, Veterans Affairs, etc. will be on-hand to provide administrative overviews, answer questions, and mingle. Refreshments will be provided.</p>
    <p>for more information, directions and to register, see <a href="http://www.umbc.edu/openhouse/" rel="nofollow external" class="bo">here</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/open-house-umbc-graduate-cybersecurity-and-data-science-programs/" rel="nofollow external" class="bo">Open House: UMBC Graduate Cybersecurity and Data Science Programs, 6-7:30 Wed. 10/25</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Open House: UMBC Graduate Professional Programs   The Fall Open House for UMBC Professional Programs, including the graduate programs on Cybersecurity and Data Science, takes place this coming...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/open-house-umbc-graduate-cybersecurity-and-data-science-programs/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72615/guest@my.umbc.edu/d9644a383040b8e674bb8afcdf28b093/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>education</Tag>
<Tag>engineering-management</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>systems-engineering</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 21 Oct 2017 15:56:12 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72616" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72616">
<Title>talk: H. Zhang on BFT- From the &#8220;Saddest Moment&#8221; to the Era of Blockchains, 12pm Fri 10/20</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h3><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/blockchain_fb-1024x536.jpg" style="max-width: 100%; height: auto;"></h3>
    <h3><em>The UMBC Cyber Defense Lab presents</em></h3>
    <h1><strong>BFT—From the “Saddest Moment” to the Era of Blockchains</strong></h1>
    <h3><em>Haibin Zhang, CSEE, UMBC</em></h3>
    <h3><span>12:00–1:00pm, </span><span>Friday, 20 October 2017, </span>ITE 231</h3>
    <p>Blockchains can generally be divided into two categories: permissionless blockchains (e.g., Bitcoin, Ethereum), and permissioned blockchains (e.g., Hyperledger Fabric). In <em>permissionless blockchains</em>, anyone can participate in the protocol. In <em>permissioned blockchains</em>, participants know the IDs of all other participants but do not need to trust them, a particularly useful scenario for business applications. As an emerging technology transforming business models, permissioned blockchains inspired a large number of industrial implementations. The Hyperledger Project (under the Linux Foundation) became a global collaborative project, now with 150+ industry members. <a href="https://en.wikipedia.org/wiki/Byzantine_fault_tolerance" rel="nofollow external" class="bo">Byzantine fault-tolerant</a> (BFT) protocols regained prominence because they can support permissioned blockchain systems. For building permissioned blockchains, BFT is widely regarded as the most appropriate primitive, one accepted by academe and industry. In this talk, I will describe a number of efficient BFT blockchain systems that I helped invent, including BChain, ByzID, CBFT, and secure causal BFT. In addition, I will share my vision for blockchains and associated research opportunities.</p>
    <p><a href="https://www.csee.umbc.edu/~hbzhang/" rel="nofollow external" class="bo">Haibin Zhang</a> is an assistant professor in the CSEE Department at UMBC. He is interested in cloud computing, cryptography, security, privacy, and distributed systems. He received the best paper candidate award at the 33rd IEEE International Symposium on Reliable Distributed Systems and proved the security of a NIST standard on ciphertext stealing.  Zhang is one of the main inventors of Norton Zone, Symantec’s scalable cloud storage, and BChain, a highly efficient BFT protocol fully implemented within Hyperledger blockchain framework.</p>
    <p><strong>Host:</strong> Alan T. Sherman, *protected email*</p>
    <p><em>The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public</em></p>
    <p>In spring 2018, Sherman will teach a CMSC-491/691 special topics class on blockchains and digital currencies.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/byzantine-fault-tolerant-blockchain-systems/" rel="nofollow external" class="bo">talk: H. Zhang on BFT- From the “Saddest Moment” to the Era of Blockchains, 12pm Fri 10/20</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   BFT—From the “Saddest Moment” to the Era of Blockchains   Haibin Zhang, CSEE, UMBC   12:00–1:00pm, Friday, 20 October 2017, ITE 231   Blockchains can...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/byzantine-fault-tolerant-blockchain-systems/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72616/guest@my.umbc.edu/151cd79322f938bdf727aa624b9d759d/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 16 Oct 2017 22:56:46 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72617" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72617">
<Title>talk: Bill Fisher (NCCOE) on IoT Security @ USG 10/30 6-8PM</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/iot_slider.jpg" style="max-width: 100%; height: auto;"></p>
    <h3>The UMBC Cybersecurity program at USG Speaker Series Presents</h3>
    <h1>The Internet of Things (IoT)</h1>
    <p>With speaker</p>
    <h3>William (Bill) Fisher, NCCoE Security Engineer</h3>
    <h3>Building III – Room 4230 (<a href="https://www.shadygrove.umd.edu/about-usg/directions-transportation" rel="nofollow external" class="bo">Universities @ Shady Grove Campus)</a></h3>
    <h3>Monday, October 30th 6:00-8:00 pm</h3>
    <p>The Internet of Things (IoT) is the inevitable result of years of Moore’s law – compact, cheap, chip platforms that can take ordinarily house hold items and make them data generating and collection devices that users can manage with their smart phone, web browser or their favorite automation platform. Physical proximity is no longer needed for things like cameras, door locks or thermostats. Instead users remotely access all of these “things” while on the go, even sharing some of their favorite things with friends and family, who need not own the thing, but simply be granted access through a web portal or mobile application. Like many technology trends before it, the IoT has brought great innovation but also great security challenges. These challenges go beyond standards and technology to economic and market forces that hinder security best practices, even for some of the most basic cyber hygiene. Join Bill Fisher of the National Cybersecurity Center of Excellence for a presentation on these challenges and basic mitigations organizations can put into place to help alleviate the risk that the IoT devices pose to consumers and the enterprise.</p>
    <p><strong>Speaker Bio:</strong></p>
    <p>Bill Fisher is a security engineer at the National Cybersecurity Center of Excellence (NCCoE). In this role, he is responsible for leading a team of engineers that work collaboratively with industry partners to address cybersecurity business challenges facing the nation. He leads the center’s Attribute Based Access Control (ABAC) project, Mobile Application Single Sign On (SSO) for the Public Safety and First Responder Sector, and is part of the ITL Cybersecurity for IoT program. Prior to his work at the NCCoE, Mr. Fisher was a program security advisor for the System High Corporation in support of the Network Security Deployment division at the Department of Homeland Security. He holds a bachelor’s degree in business administration from American University and a master’s degree in cybersecurity from Johns Hopkins University.</p>
    <p><strong>Host:</strong> Dr. Behnam Shariati (*protected email*) and UMBC Graduate Cybersecurity Association at USG</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/talk-bill-fisher-nccoe-iot-security-usg-1030-6-8pm/" rel="nofollow external" class="bo">talk: Bill Fisher (NCCOE) on IoT Security @ USG 10/30 6-8PM</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cybersecurity program at USG Speaker Series Presents   The Internet of Things (IoT)   With speaker   William (Bill) Fisher, NCCoE Security Engineer   Building III – Room 4230...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/talk-bill-fisher-nccoe-iot-security-usg-1030-6-8pm/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72617/guest@my.umbc.edu/85d6e62ef63ac2033b32c576bc185d28/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 16 Oct 2017 11:47:51 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72618" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72618">
<Title>talk: Keith Mayes on Attacks on Smart Cards, RFIDs and Embedded System</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/smartcard.jpg" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1>Attacks on Smart Cards, RFIDs and Embedded Systems</h1>
    <h3><a href="https://pure.royalholloway.ac.uk/portal/en/persons/keith-mayes(290542c6-8422-457e-85c0-cc4dde743624).html" rel="nofollow external" class="bo">Prof. Keith Mayes</a><br>
    Royal Holloway University of London</h3>
    <h3>10-11:00am Tuesday, 10 October 2017, ITE 325, UMBC</h3>
    <p>Smart Cards and RFIDs exist with a range of capabilities and are used in their billions throughout the world. The simpler devices have poor security, however, for many years, high-end smart cards have successfully been used in a range of systems such as banking, passports, mobile communication, satellite TV etc. Fundamental to their success is a specialist design to offer remarkable resistance to a wide range of attacks, including physical, side-channel and fault. This talk describes a range of known attacks and the countermeasures that are employed to defeat them.</p>
    <p>Prof. Keith Mayes is the Head of the School of Mathematics and Information Security at Royal Holloway University of London. He received his BSc (Hons) in Electronic Engineering in 1983 from the University of Bath, and his PhD degree in Digital Image Processing in 1987. He is an active researcher/author with 100+ publications in numerous conferences, books and journals. His interests include the design of secure protocols, communications architectures and security tokens as well as associated attacks/countermeasures. He is a Fellow of the Institution of Engineering and Technology, a Founder Associate Member of the Institute of Information Security Professionals, a Member of the Licensing Executives Society and a member of the editorial board of the Journal of Theoretical and Applied Electronic Commerce Research (JTAER).</p>
    <p> </p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/talk-keith-mayes-attacks-smart-cards-rfids-embedded-system-cybersecurity-rfid/" rel="nofollow external" class="bo">talk: Keith Mayes on Attacks on Smart Cards, RFIDs and Embedded System</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Attacks on Smart Cards, RFIDs and Embedded Systems   Prof. Keith Mayes  Royal Holloway University of London   10-11:00am Tuesday, 10 October 2017, ITE 325, UMBC   Smart Cards and RFIDs exist...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/talk-keith-mayes-attacks-smart-cards-rfids-embedded-system-cybersecurity-rfid/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72618/guest@my.umbc.edu/f693b6777313d350fc774fad7d734ed2/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 06 Oct 2017 21:46:20 -0400</PostedAt>
</NewsItem>

</News>
