<?xml version="1.0"?>
<News hasArchived="true" page="3" pageCount="7" pageSize="10" timestamp="Wed, 29 Apr 2026 15:11:25 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=3&amp;tag=talks">
<NewsItem contentIssues="true" id="96902" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96902">
<Title>talk: Secure Computation: From Theory to Practice, 12-1pm Oct 30</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="511" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/katz-1024x511.png" alt="" style="max-width: 100%; height: auto;"><hr><h5><strong>UMBC Cyber Defense Lab presents</strong></h5><hr><h2><strong>Secure Computation: From Theory to Practice</strong></h2><h3><strong>Jonathan Katz</strong></h3><h3><strong>Computer Science Department<br>University of Maryland, College Park</strong></h3><h3><strong>12:00–1:00 pm EDT, Friday, 30 October 2020</strong><br>Online via <a href="https:://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">Webex</a> </h3><hr><p>Protocols for secure multi-party computation (<a href="https://en.wikipedia.org/wiki/Secure_multi-party_computation" rel="nofollow external" class="bo">MPC</a>) allow a collection of mutually distrusting parties to compute a function of their private inputs without revealing anything else about their inputs to each other. Secure computation was shown to be feasible 35 years ago, but only in the past decade has its efficiency been improved to the point where it has been implemented and, more recently, begun to be used. This real-world deployment of secure computation suggests new applications and raises new questions.</p><p>This talk will survey some recent work at the intersection of the theory and practice of MPC, focusing on a surprising application to the construction of <a href="https://microsoft.github.io/Picnic/" rel="nofollow external" class="bo">Picnic</a>, a “post-quantum” signature scheme currently under consideration by NIST for standardization.</p><p><a href="https://www.cs.umd.edu/~jkatz/" rel="nofollow external" class="bo">Jonathan Katz</a> is a faculty member in the department of computer science at the University of Maryland, College Park, where he formerly served as director of the Maryland Cybersecurity Center for over five years. He is an IACR Fellow, was named a University of Maryland distinguished scholar-teacher in 2017-2018, and received the ACM SIGSAC Outstanding Contribution Award in 2019.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public.</p><p>Upcoming CDL Meetings: Nov. 13, TBA, [possibly: David R Imbordino (NSA), Security of the 2020 presidential election]; Dec. 11, TBA, [possibly: Peter A. H. Peterson (Univ. of Minnesota Duluth), Adversarial Thinking]</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-secure-computation-from-theory-to-practice-12-1pm-oct-30/" rel="nofollow external" class="bo">talk: Secure Computation: From Theory to Practice, 12-1pm Oct 30</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab presents   Secure Computation: From Theory to Practice  Jonathan Katz  Computer Science Department University of Maryland, College Park  12:00–1:00 pm EDT, Friday, 30...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-secure-computation-from-theory-to-practice-12-1pm-oct-30/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96902/guest@my.umbc.edu/d095dd467d54d3508b78e08059ead114/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>quantum-computing</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 24 Oct 2020 13:33:48 -0400</PostedAt>
<EditAt>Sat, 10 Oct 2020 13:33:00 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="96548" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96548">
<Title>talk: BVOT, Self-Tallying Boardroom Voting with Oblivious Transfer; 12-1pm 11/6</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/voting-1024x512.png" alt="" style="max-width: 100%; height: auto;"> BVOT is a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally info. available before polls close), and dispute-freeness (voters can see that all voters followed the protocol).<hr><h4><strong>UMBC Cyber Defense Lab</strong></h4><h2><strong>BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer</strong></h2><h3><strong>Farid Javani, CSEE, UMBC</strong></h3><h4>12:00–1:00pm, Friday, 6 November 2020</h4><h4><a href="http://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">http://<strong>umbc.webex.com/meet/sherman</strong></a></h4><p><strong>(Joint work with Alan T. Sherman)</strong></p><hr><p>A boardroom election is an election with a small number of voters carried out with public communications. We present <a href="https://arxiv.org/pdf/2010.02421.pdf" rel="nofollow external" class="bo">BVOT</a>, a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally information is available before the polls close), and dispute-freeness (voters can observe that all voters correctly followed the protocol).</p><p><a href="https://arxiv.org/pdf/2010.02421.pdf" rel="nofollow external" class="bo">BVOT</a> works by using a multiparty threshold homomorphic encryption system in which each candidate is associated with a masked unique prime. Each voter engages in an oblivious transfer with an untrusted distributor: the voter selects the index of a prime associated with a candidate and receives the selected prime in a masked form. The voter then casts their vote by encrypting their masked prime and broadcasting it to everyone. The distributor does not learn the voter’s choice, and no one learns the mapping between primes and candidates until the audit phase. By hiding the mapping between primes and candidates, BVOT provides voters with insufficient information to carry out effective cheating. The threshold feature prevents anyone from computing any partial tally—until everyone has voted. Multiplying all votes, their decryption shares, and the unmasking factor yields a product of the primes each raised to the number of votes received.</p><p>In contrast to some existing boardroom voting protocols, BVOT does not rely on any zero-knowledge proof; instead, it uses oblivious transfer to assure ballot secrecy and correct vote casting. Also, BVOT can handle multiple candidates in one election. BVOT prevents cheating by hiding crucial information: an attempt to increase the tally of one candidate might increase the tally of another candidate. After all votes are cast, any party can tally the votes.</p><p><a href="https://www.linkedin.com/in/farid-javani-68118741/" rel="nofollow external" class="bo">Farid Javani</a> is a Ph.D. candidate in computer science at UMBC, working with Alan Sherman. His research interests include algorithms, security, applied cryptography, and distributed systems. He is the manager of the Enterprise Architecture team at CCC Information Services in Chicago. email: *protected email*</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1:00 pm. All meetings are open to the public. Upcoming CDL Meetings: Oct. 30, Jonathan Katz (UMCP), [possibly on secure distributed computation]; Nov. 13, TBA, [possibly: David R Imbordino (NSA), Security of the 2020 presidential election]; and Dec. 11, TBA, [possibly: Peter A. H. Peterson (Univ. of Minnesota Duluth), Adversarial Thinking]</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-bvot-self-tallying-boardroom-voting-with-oblivious-transfer-12-1pm-11-6/" rel="nofollow external" class="bo">talk: BVOT, Self-Tallying Boardroom Voting with Oblivious Transfer; 12-1pm 11/6</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary> BVOT is a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally info. available before polls close), and dispute-freeness (voters can see that all voters followed the...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-bvot-self-tallying-boardroom-voting-with-oblivious-transfer-12-1pm-11-6/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96548/guest@my.umbc.edu/ca88798fe3c6bb9e5e3e69188b2b1c80/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 11 Oct 2020 17:46:41 -0400</PostedAt>
<EditAt>Mon, 19 Oct 2020 17:46:00 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="96462" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96462">
<Title>talk: Tracking Hacking: The Disturbing Proliferation of Commercial Spyware, 1pm Oct. 23</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/Screen-Shot-2020-10-07-at-2.29.05-PM-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h5>Distinguished Speaker Series</h5><h5>The UMBC Center for Cybersecurity and<br> Dept. of Computer Science &amp; Electrical Engineering</h5><hr><h2><strong>Tracking Hacking: The Disturbing Proliferation of Commercial Spyware</strong></h2><h4><strong>Ronald J. Deibert, Ph.D.<br>Prof. of Political Science, Director of Citizen Lab<br>Munk School of Global Affairs and Public Policy, University of Toronto</strong></h4><hr><h4>1–2:00 pm Friday, 23 October 2020</h4><h4><a href="https://umbc.webex.com/umbc/j.php?MTID=m727f3d57be934fcdee9a51742ef56ebd" rel="nofollow external" class="bo">Webex</a>, Mtg. #: 120 360 5372 Password: 4ExV8dCM3J2</h4><hr><p>Political struggles in and through the global Internet and related technologies are entering into a particularly dangerous phase for openness, security, and human rights. A growing number of governments and private companies have turned to “offensive” operations, with means ranging from sophisticated and expensive to homegrown and cheap. A large and largely unregulated market for commercial surveillance technology is finding willing clientele among the world’s least accountable regimes. Powerful spyware tools are used to infiltrate civil society networks, targeting the devices of journalists, human rights defenders, minority movements, and political opposition, often with lethal consequences. Drawing from the last decade of research at the University of Toronto’s Citizen Lab, I will provide an overview of these disturbing trends and discuss some pathways to repairing and restoring the Internet as a sphere that supports, rather than diminishes, human rights.</p><p><a href="https://en.wikipedia.org/wiki/Ronald_Deibert" rel="nofollow external" class="bo">Ronald J. Deibert</a> is Professor of Political Science and Director of the <a href="https://www.google.com/url?q=https://citizenlab.ca/&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw0zS6IgKm5IJFowm1CGN156" rel="nofollow external" class="bo">Citizen Lab</a> at the Munk School of Global Affairs and Public Policy, University of Toronto. The Citizen Lab undertakes interdisciplinary research at the intersection of global security, ICTs, and human rights. The research outputs of the Citizen Lab are routinely covered in global media, including over two dozen reports receiving front-page coverage in the New York Times, Washington Post, and other media over the last decade. Deibert is the author of Black Code: Surveillance, Privacy, and the Dark Side of the Internet (Random House: 2013) Reset: Reclaiming the Internet for Civil Society (House of Anansi: 2020) as well as numerous books, chapters, articles, and reports on Internet censorship, surveillance, and cybersecurity. In 2013, he was appointed to the Order of Ontario and awarded the Queen Elizabeth II Diamond Jubilee medal, for being “among the first to recognize and take measures to mitigate growing threats to communications rights, openness and security worldwide.”</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/tracking-hacking-the-disturbing-proliferation-of-commercial-spyware/" rel="nofollow external" class="bo">talk: Tracking Hacking: The Disturbing Proliferation of Commercial Spyware, 1pm Oct. 23</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Distinguished Speaker Series  The UMBC Center for Cybersecurity and  Dept. of Computer Science &amp; Electrical Engineering   Tracking Hacking: The Disturbing Proliferation of Commercial Spyware...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/tracking-hacking-the-disturbing-proliferation-of-commercial-spyware/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96462/guest@my.umbc.edu/6441a83676b8d7d7b866889079311d73/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 07 Oct 2020 15:13:47 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="96415" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96415">
<Title>talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/dc_blockchain_tweet-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h3>UMBC Data Science Meetup Talk</h3><h1><strong>Exploding Blockchain Myths</strong></h1><h3><strong>Maria Vachino and Dr. James P. Howard</strong></h3><h3>5:30-7:00pm Tuesday, 13 October 2020</h3><hr><p>In this talk, Maria Vachino from Easy Dynamics and Dr. James P. Howard from APL will provide an overview of what blockchain is and isn’t, focusing on non-cryptocurrency use cases, will explain the results of their research for the DHS S&amp;T Cybersecurity Directorate, and will provide insight into the value (or lack therefore) of the technology. </p><p>References:<br>  • <a href="https://ieeexplore.ieee.org/document/8965252/" rel="nofollow external" class="bo">https://ieeexplore.ieee.org/document/8965252/</a><br>  • <a href="http://jitm.ubalt.edu/XXX-3/article3.pdf" rel="nofollow external" class="bo">http://jitm.ubalt.edu/XXX-3/article3.pdf</a></p><p><a href="https://www.linkedin.com/in/mariavachino/" rel="nofollow external" class="bo">Maria Vachino</a> is the Director of Digital Identity at <a href="https://www.easydynamics.com/" rel="nofollow external" class="bo">Easy Dynamics</a> where she is focused on Identity Credential &amp; Access Management (ICAM) technologies, policies, &amp; standards, Cybersecurity, and IT modernization for the US Federal Government. She started investigating applications for blockchain technology in 2015 as the Technical and Government Engagement Lead for the DHS S&amp;T Cyber Security Directorate’s Identity Management Research &amp; Development Program while a member of the Senior Professional Staff at the Johns Hopkins Applied Physics Lab. Maria has a BS in Computer Science from UMBC and an MS in Cybersecurity.</p><p>Dr. <a href="https://www.linkedin.com/in/k3jph/" rel="nofollow external" class="bo">James P. Howard, II</a> (UMBC Ph.D. ’14) is a scientist at the <a href="https://www.jhuapl.edu/" rel="nofollow external" class="bo">Johns Hopkins Applied Physics Laboratory</a>. Previously, he was a consultant to numerous government agencies, including the Securities and Exchange Commission, the Executive Office of the President, and the United States Department of Homeland Security, and worked for the Board of Governors of the Federal Reserve System as an internal consultant on scientific computing. He is a passionate educator, teaching mathematics and statistics at the University of Maryland Global Campus since 2010 and has taught public management at Central Michigan University, Penn State, and the University of Baltimore. His most recent work has modeled the spread of infectious respiratory diseases and Ebolavirus, predicted global disruptive events, researched using blockchain for government services, and created devices for rescuing victims of building collapse. He is the author of two books.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/" rel="nofollow external" class="bo">talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Data Science Meetup Talk  Exploding Blockchain Myths  Maria Vachino and Dr. James P. Howard  5:30-7:00pm Tuesday, 13 October 2020   In this talk, Maria Vachino from Easy Dynamics and Dr....</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96415/guest@my.umbc.edu/097b844dc5ba2983199d05604cc47309/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 06 Oct 2020 20:58:09 -0400</PostedAt>
<EditAt>Tue, 06 Oct 2020 20:58:09 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="95860" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/95860">
<Title>talk: Psychometric Evaluation of the Cybersecurity Concept Inventory, 12-1 Fri 9/18</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="563" src="https://www.csee.umbc.edu/wp-content/uploads/2020/09/cybersecurity_education-1024x563.jpg" alt="" style="max-width: 100%; height: auto;"><hr><p><strong>The UMBC Cyber Defense Lab presents</strong></p><hr><h2><strong>Psychometric Evaluation of the Cybersecurity Concept Inventory</strong></h2><hr><h2><strong>Seth Poulsen</strong></h2><h3><strong>Computer Science<br>University of Illinois at Urbana-Champaign</strong></h3><p><strong>12:00noon–1pm, Friday, September 18, 2020</strong></p><p><strong><a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">https://umbc.webex.com/meet/sherman</a></strong></p><p><strong>Joint work with Geoffrey Herman, Alan Sherman, Linda Oliva, Peter Peterson, Enis Golaszewski, Travis Scheponik, and Akshita Gorti.</strong></p><p>We present a psychometric evaluation of a revised version of the Cybersecurity Concept Inventory (CCI) completed by 355 students from 29 colleges and universities. The CCI is a conceptual test of understanding created to enable research on instruction quality in cybersecurity education. This work extends previous expert review and small-scale pilot testing of the CCI. Results show that the CCI aligns with a curriculum many instructors expect from an introductory cybersecurity course, and that it is a valid and reliable tool for assessing what cybersecurity conceptual knowledge students learned.</p><p>Seth Poulsen is a PhD candidate in computer science at the University of Illinois at Urbana-Champaign. I’m interested in Computing Education, Programming Language design and implementation, Math Education, and any interesting intersections of the above. Previously, he was a Software Engineer at Amazon.com, working on Kindle Web Rendering and the Kindle Lite Android app. email: *protected email*,</p><p>Support for this research was provided in part by the U.S. Department of Defense under CAE-R grants H98230-15-1-0294, H98230-15-1-0273, H98230-17-1-0349, H98230-17-1-0347; and by the National Science Foundation under UMBC SFS grants DGE-1241576, 1753681, and SFS Capacity Grants DGE-1819521, 1820531.  For more on the educational Cybersecurity Assessment Tools (CATS) Project: <a href="https://arxiv.org/pdf/2004.05248.pdf">https://arxiv.org/pdf/2004.05248.pdf</a></p><p>Host: Alan T. Sherman, *protected email*</p><p>The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public.  Upcoming CDL Meetings: 
    </p><ul><li>Oct. 2, TBA [possibly: security of payment infrastructure]</li>
    <li>Oct. 16, TBA [possibly: Jonathan Katz (GMU)]</li>
    <li>Oct. 30, TBA</li>
    <li>Nov. 13, TBA, [possibly: David R Imbordino (NSA), Security of the 2020 presidential election]</li>
    <li>Dec. 11, TBA, [possibly: Peter A. H. Peterson (Univ. of Minnesota Duluth), Adversarial Thinking]</li>
    </ul></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/09/talk-psychometric-evaluation-of-the-cybersecurity-concept-inventory-12-1-fri-9-18/" rel="nofollow external" class="bo">talk: Psychometric Evaluation of the Cybersecurity Concept Inventory, 12-1 Fri 9/18</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Psychometric Evaluation of the Cybersecurity Concept Inventory   Seth Poulsen  Computer Science University of Illinois at Urbana-Champaign  12:00noon–1pm,...</Summary>
<Website>https://www.csee.umbc.edu/2020/09/talk-psychometric-evaluation-of-the-cybersecurity-concept-inventory-12-1-fri-9-18/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95860/guest@my.umbc.edu/e7176914894654fe973ff4ba27514c1a/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 16 Sep 2020 18:51:11 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="95450" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/95450">
<Title>talk: Matt Green on Privacy-Preserving Cryptographic Protocols, 12-1 EDT Fri. 9/4, online</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/08/matt_green.png" alt="" style="max-width: 100%; height: auto;"><p>   </p><h4>The UMBC Cyber Defense Lab presents</h4><hr><h2><strong>Privacy-Preserving Cryptographic Protocols</strong> </h2><hr><h2><strong>Professor Matthew Green<br>Johns Hopkins University</strong></h2><h4><strong>12:00-1:00 pm Friday, 4 September 2020<br>WebEx: <a href="http://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">http://umbc.webex.com/meet/sherman</a></strong><a href="http://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">  </a></h4><hr><p>We investigate the problem of automating the development of adaptive chosen-ciphertext attacks on systems that contain vulnerable format oracles. Rather than simply automate the execution of known attacks, we consider a more challenging problem: to programmatically derive a novel attack strategy, given only a machine-readable description of the plaintext verification function and the malleability characteristics of the encryption scheme. We present a new set of algorithms that use SAT and SMT solvers to reason deeply over the design of the system, producing an automated attack strategy that can decrypt protected messages entirely.</p><p><strong><a href="http://spar.isi.jhu.edu/~mgreen/" rel="nofollow external" class="bo">Matthew Green</a></strong> is an Associate Professor at the Johns Hopkins Information Security Institute. His research includes techniques for privacy-enhanced information storage, anonymous payment systems, and bilinear map- based cryptography. He is one of the creators of the Zerocash protocol, which is used by the Zcash cryptocurrency, and a founder of an encryption startup Zeutro. He was formerly a partner in Independent Security Evaluators, a custom security evaluation and design consultancy, and currently consults independently. From 1999-2003, he served as a senior technical staff member at AT&amp;T Laboratories/Research in Florham Park, NJ. email: *protected email* Dr. Green writes a popular blog on applied cryptography, A Few Thoughts on Cryptographic Engineering, <a href="https://blog.cryptographyengineering.com/" rel="nofollow external" class="bo">A Few Thoughts on Cryptographic Engineering</a></p><hr><p>Host: Alan T. Sherman,, *protected email* Support for this event was provided in part by the NSF under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings:</p><ul><li>The Cyber Defense Lab hosts biweekly talks on Fridays 12-1pm.</li></ul></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/09/talk-matt-green-on-privacy-preserving-cryptographic-protocols/" rel="nofollow external" class="bo">talk: Matt Green on Privacy-Preserving Cryptographic Protocols, 12-1 EDT Fri. 9/4, online</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    The UMBC Cyber Defense Lab presents   Privacy-Preserving Cryptographic Protocols    Professor Matthew Green Johns Hopkins University  12:00-1:00 pm Friday, 4 September 2020...</Summary>
<Website>https://www.csee.umbc.edu/2020/09/talk-matt-green-on-privacy-preserving-cryptographic-protocols/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95450/guest@my.umbc.edu/3f30b5b4cc036e2cb3b597c9c394a3ac/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 03 Sep 2020 23:03:53 -0400</PostedAt>
<EditAt>Thu, 03 Sep 2020 23:03:53 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="92799" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/92799">
<Title>talk: Identifying and Addressing Concerning Behavior in the Digital Age, 12-1 Fri 5/8</Title>
<Body>
<![CDATA[
    <div class="html-content"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/05/secret-service-1024x512.jpg" alt="two secret service agents confer" style="max-width: 100%; height: auto;"><p><strong>The UMBC Cyber Defense Lab presents</strong></p><h1><strong>Identifying and Addressing Concerning <br> Behavior in the Digital Age</strong></h1><p>   </p><h3><strong>Jason W. Wells</strong><br>Graduate Student, Cybersecurity MPS<br>University of Maryland, Baltimore County</h3><h3><strong>12:00–1pm Friday, 8 May 2020, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">webex</a></strong></h3><p>   </p><p>The United States Secret Service (USSS) is widely known as the premier law enforcement agency that is charged with protecting some of the most important political figures in the world. Some of these protectees include the President of the United States, the Vice-President, the First Family and Second Family, and Heads of State visiting the United States, to name a few. A major part of the protective mission of the USSS is focused around “protective intelligence,” where agents are trained to identify concerning and threatening behavioral indicators in others, and then to address those issues in a proactive and positive manner and ensure that the community is safe from harm. This proactive methodology has been researched and applied for decades and has a very high rate of success. Now, other law enforcement agencies throughout the country have started to apply this training to their agents and officers. Can these methodologies be used and/or modified to recognize threats in cyberspace as well?</p><hr><p>Jason Wells is a former special agent with the United States Secret Service, where he served for nine years from 2005 – 2014. During that time, Mr. Wells was extensively trained in identifying and addressing threat-related and concerning behavioral indicators, and how to address those behaviors in a positive and proactive manner. In 2016, Mr. Wells published his first book Our Path to Safety: A U.S. Secret Service Agent’s Guide to Creating Safe Communities (ISBN-13: 978-0-9982488-0-6) on how the community can identify these behavioral conditions in the same way that federal law enforcement does every day. Mr. Wells earned his undergraduate degree from the Virginia Military Institute and his first graduate degree from Henley-Putnam University in Strategic Security and Protection Management in 2014. Additionally, Mr. Wells has published 11 editorial articles in print media on improving safety and security methodologies in schools and businesses. Currently, he is an SFS scholarship graduate student at UMBC with plans to complete his degree in spring 2020. He and his wife, Blythe, have two children and have lived in Baltimore County since 2008.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings: May 22, Spring SFS Meeting at UMBC, 9:30am-2pm, via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx.</a> </p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/05/talk-identifying-and-addressing-concerning-behavior-in-the-digital-age-12-1-fri-5-8/" rel="nofollow external" class="bo">talk: Identifying and Addressing Concerning Behavior in the Digital Age, 12-1 Fri 5/8</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Identifying and Addressing Concerning   Behavior in the Digital Age       Jason W. Wells Graduate Student, Cybersecurity MPS University of Maryland, Baltimore...</Summary>
<Website>https://www.csee.umbc.edu/2020/05/talk-identifying-and-addressing-concerning-behavior-in-the-digital-age-12-1-fri-5-8/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/92799/guest@my.umbc.edu/c57f1df02979ddc3394e4b7f0292a546/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 03 May 2020 20:41:58 -0400</PostedAt>
<EditAt>Sun, 03 May 2020 20:41:58 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="92644" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/92644">
<Title>talk: Cybersecurity during COVID-19 and other emergencies, 12-1 Tue May 5</Title>
<Body>
<![CDATA[
    <div class="html-content"><img src="https://www.csee.umbc.edu/wp-content/uploads/2020/05/covid19twitter.png" alt="talk: Cybersecurity during COVID-19 and other emergencies, 12-1 Tue May 5" style="max-width: 100%; height: auto;"><p>The UMBC Center for Cybersecurity (UCYBR) Presents</p><h2><strong>Cybersecurity during COVID-19 and other emergencies</strong></h2><p><strong>Dr. Richard Forno</strong><br>Senior Lecturer, Computer Science &amp; Electrical Engineering<br>Director, UMBC Graduate Cybersecurity Program &amp; Assistant Director, UMBC Center for Cybersecurity</p><p><strong>12–1 pm Tuesday, 5 May 2020</strong><br>online via <a href="https://umbc.webex.com/umbc/j.php?MTID=me419650833aceba7e5af5c333c02085c" rel="nofollow external" class="bo">webex</a><br></p><p>‘Cyber’ touches many, if not all, parts of society and organizations. However, even in 2020, cybersecurity often still is seen as exclusively a function of IT and not a function of enterprise mission assurance or operational resiliency. Accordingly, operational performance can be compromised by a failure to consider, if not embrace, cybersecurity principles and concerns during crisis planning – which can significantly impede effective crisis response and incident management during actual events and make a bad situation even worse. This talk will discuss the role of cybersecurity and cybersecurity thinking within crisis management and incident handling, with a particular emphasis on maintaining operational resiliency and mission assurance during the ongoing COVID-19 pandemic.</p><hr><p>Dr. Richard Forno is a Senior Lecturer in the UMBC Department of Computer Science and Electrical Engineering, where he directs the UMBC Graduate Cybersecurity Program and serves as the Assistant Director of UMBC’s Center for Cybersecurity. Prior to joining UMBC in 2010, his twenty-year career in operational cybersecurity spanned the government, military, and private sector, including helping build a formal cybersecurity program for the US House of Representatives, serving as the first Chief Security Officer for Network Solutions (then, the global center of the internet DNS system), consulting to Fortune 100 companies, and more. From 2005-12 he was a Visiting Scientist at the Software Engineering Institute at Carnegie Mellon University, where he taught courses on incident handling for the CERT Coordination Center (CERT/CC).</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/04/talk-cybersecurity-during-covid-19-and-other-emergencies/" rel="nofollow external" class="bo">talk: Cybersecurity during COVID-19 and other emergencies, 12-1 Tue May 5</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Center for Cybersecurity (UCYBR) Presents  Cybersecurity during COVID-19 and other emergencies  Dr. Richard Forno Senior Lecturer, Computer Science &amp; Electrical Engineering Director,...</Summary>
<Website>https://www.csee.umbc.edu/2020/04/talk-cybersecurity-during-covid-19-and-other-emergencies/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/92644/guest@my.umbc.edu/4dedfebfbd0eb9440f728609f77e20f9/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 27 Apr 2020 18:13:32 -0400</PostedAt>
<EditAt>Mon, 27 Apr 2020 18:13:32 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="92101" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/92101">
<Title>Talk: Lance Hoffman (GWU) Cyber Policy Challenges, 12-1pm 4/24 online</Title>
<Body>
<![CDATA[
    <div class="html-content"><img width="1024" height="536" src="https://www.csee.umbc.edu/wp-content/uploads/2020/04/Lance_Hoffman_talk-1024x536.png" alt="" style="max-width: 100%; height: auto;"><h4>The UMBC Cyber Defense Lab presents</h4><h2>Cyber Policy Challenges</h2><h3>Lance J. Hoffman<br>Distinguished Professor, George Washington University</h3><h3>12–1:00 pm, Friday, 24 April 2020</h3><h3><a href="http://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">remotely via WebEx</a> </h3><hr><p>System attackers and defenders operate on a constantly changing battlefield, and some of the more serious conflicts involving nation-states could be considered acts of war, though we are still in the early stages of defining war in cyberspace. Policies for security and privacy can vary wildly, and have important personal, national, and global consequences for privacy, free speech, censorship, and other issues. Things get even more complicated with the advent of the Internet of Things, where (mostly unsophisticated) users may think they have more control than they actually do and can make bad mistakes. Various ethical issues related to the development of these systems, including bias in artificial intelligence and what harm to choose when harm is unavoidable have only started to be examined. This talk will provide both historical context and some discussion of topical issues such as Zoombombing and the security of electronic voting systems as compared to mail ballots and traditional voting.</p><hr><p>Professor <a href="https://www.cs.seas.gwu.edu/lance-j-hoffman" rel="nofollow external" class="bo">Lance J. Hoffman</a> is the author or editor of numerous articles and five books on computer security and privacy. He developed the first regularly offered course on computer security at the University of California, Berkeley in 1970. A Fellow of the Association for Computing Machinery and a member of the Cyber Security Hall of Fame, Dr. Hoffman institutionalized the ACM Conference on Computers, Freedom, and Privacy. He has served on a number of Advisory Committees including those of Federal Trade Commission and the Department of Homeland Security and has testified before Congress on security and privacy-related issues. He is the principal investigator of the CyberCorps program at GWU. Dr. Hoffman earned his Ph. D. in Computer Science from Stanford University, after a B.S. in Mathematics from Carnegie Mellon University.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL meetings: May 8, Jason Wells (UMBC SFS scholar) law enforcement;  May 22, Spring SFS Meeting at UMBC, 9:30am-2pm, ITE456</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/04/talk-lance-hoffman-gwu-cyber-policy-challenges/" rel="nofollow external" class="bo">Talk: Lance Hoffman (GWU) Cyber Policy Challenges, 12-1pm 4/24 online</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Cyber Policy Challenges  Lance J. Hoffman Distinguished Professor, George Washington University  12–1:00 pm, Friday, 24 April 2020  remotely via WebEx...</Summary>
<Website>https://www.csee.umbc.edu/2020/04/talk-lance-hoffman-gwu-cyber-policy-challenges/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/92101/guest@my.umbc.edu/82505162580cdf42c92f5a6e2c15d321/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 11 Apr 2020 12:15:46 -0400</PostedAt>
<EditAt>Sat, 11 Apr 2020 12:15:46 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="92012" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/92012">
<Title>online talk: Opal Hard Drives for Ransomware Resilience</Title>
<Body>
<![CDATA[
    <div class="html-content"><img width="978" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/04/recovery_fb..png" alt="" style="max-width: 100%; height: auto;"><p>The UMBC Cyber Defense Lab presents</p><h2><strong>Opal Hard Drives for Ransomware Resilience</strong></h2><h3><strong>Russ Fink, Ph.D.</strong><br>Senior Staff, the Johns Hopkins University / Applied Physics Laboratory</h3><h3>12:00–1 pm,  Friday, 10 April 2020<br>via WebEx: <a href="https://www.google.com/url?q=http://umbc.webex.com/meet/sherman&amp;sa=D&amp;usd=2&amp;usg=AOvVaw2oq5CHVpDAQ17KnTbdZXUS" rel="nofollow external" class="bo">umbc.webex.com/meet/sherman</a></h3><p>   <br> </p><p>Ransomware is crippling industry and government alike.  Paying the ransom doesn’t guarantee you’ll get your files back, but it funds the criminals who will continue on. Restoring from traditional network backups takes time, and never gets you back to the system you had before the attack.  In response, we have developed a resilient, local malware restore and recovery capability, capable of quickly restoring OS images onto “bare metal” after an attack or misconfiguration, useful for many applications.</p><p>I will discuss the technical details, including a description of the Opal hard drive specification, the Trusted Computing Group’s Trusted Platform Module (TPM), and how we secure secrets needed for WUBU – Wake-Up-Back-Up.  I’ll talk through some of the open-source technologies that we used to build our solution.  WebEx willing, I will give a live demonstration of a ShinoLocker ransomware infection, followed by an “as if nothing ever happened” recovery that takes only ten minutes.</p><p>Russ Fink is a senior staff member at the Johns Hopkins University / Applied Physics Laboratory.  His research interests include computational private information retrieval, trusted computing applications, applied cryptography, and enterprise and mission cyber resiliency techniques.  He earned a Ph.D. in computer science from UMBC in 2010 working with Dr. Alan Sherman.  email: *protected email*</p><p>Host: Alan T. Sherman, *protected email*. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.  The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public.  Upcoming CDL Meetings:</p><ul><li>Apr 24, Lance Hoffman (GWU), policy</li><li>May 8, Jason Wells (UMBC SFS scholar), law enforcement</li><li>May 22, Spring SFS Meeting at UMBC, 9:30am-2pm, ITE 456</li></ul>
    <p>The post <a href="https://www.csee.umbc.edu/2020/04/online-talk-opal-hard-drives-for-ransomware-resilience/" rel="nofollow external" class="bo">online talk: Opal Hard Drives for Ransomware Resilience</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Opal Hard Drives for Ransomware Resilience  Russ Fink, Ph.D. Senior Staff, the Johns Hopkins University / Applied Physics Laboratory  12:00–1 pm,  Friday, 10...</Summary>
<Website>https://www.csee.umbc.edu/2020/04/online-talk-opal-hard-drives-for-ransomware-resilience/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/92012/guest@my.umbc.edu/f3fa76f5ca100a5158da1e1a80870c9e/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 09 Apr 2020 11:33:17 -0400</PostedAt>
<EditAt>Thu, 09 Apr 2020 11:33:17 -0400</EditAt>
</NewsItem>

</News>
