<?xml version="1.0"?>
<News hasArchived="true" page="5" pageCount="17" pageSize="10" timestamp="Sat, 18 Apr 2026 17:17:28 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=5">
<NewsItem contentIssues="true" id="129853" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129853">
<Title>Cybersecurity CTF competition starts 1pm Friday 4/29</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/justlogo3.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/justlogo3-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><p>The UMBC Cyberdawgs will host a 48-hour Jeopardy-style <a href="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" rel="nofollow external" class="bo">Capture The Flag</a> cybersecurity competition, online and in person for UMBC participants.</p><p>DawgCTF 2022 will be a Jeopardy-style CTF, so things are pretty simple.  Players register online, either in teams or alone. At 1300 EDT on April 29, 2022, the competition will open. Players will have access to a board of <em>challenges</em>, ranging from easy to nigh-impossible, and scored appropriately. Whoever earns the most points by solving challenges wins!  The in-person part of the event will take place in room 206 of the Public Policy Building.</p><p>The CTF will begin at <strong>1:00 PM EDT on Friday, April 29, 2022</strong>, and end at <strong>1:00 PM EDT on Sunday, May 1, 2022</strong>, for a total runtime of 48 hours. The maximum team size is <strong>four</strong>. There will be an in-person component <strong>for UMBC participants only</strong>.</p><p>At 8:00 PM on Friday, April 29<sup>th</sup> (7 hours after the start), we will give out some prizes to UMBC competitors, depending on their current position on the scoreboard at 8:00 PM. <strong>Only UMBC competitors will be eligible for these prizes.</strong> Don’t worry, they’ll be small prizes, mostly just for fun, and the clout and CTFtime credit will go to the “official” winners at competition closing time (1 pm on Sunday).</p><h2><strong>See the <a href="https://umbccd.net/" rel="nofollow external" class="bo">Dawg CTF 2022 site</a> to register, get more information, and  join the Discord server</strong>.</h2></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/04/cybersecurity-ctf-competition-starts-1pm-friday-4-29/" rel="nofollow external" class="bo">Cybersecurity CTF competition starts 1pm Friday 4/29</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyberdawgs will host a 48-hour Jeopardy-style Capture The Flag cybersecurity competition, online and in person for UMBC participants.  DawgCTF 2022 will be a Jeopardy-style CTF, so things...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/04/cybersecurity-ctf-competition-starts-1pm-friday-4-29/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129853/guest@my.umbc.edu/0822de8c309dd82c5655432c00695220/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 26 Apr 2022 22:47:03 -0400</PostedAt>
<EditAt>Tue, 26 Apr 2022 22:47:03 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="118961" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/118961">
<Title>Cybersecurity CTF competition starts 1pm Friday 4/29</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/justlogo3.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/justlogo3-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><p>The UMBC Cyberdawgs will host a 48-hour Jeopardy-style <a href="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" rel="nofollow external" class="bo">Capture The Flag</a> cybersecurity competition, online and in person for UMBC participants.</p><p>DawgCTF 2022 will be a Jeopardy-style CTF, so things are pretty simple.  Players register online, either in teams or alone. At 1300 EDT on April 29, 2022, the competition will open. Players will have access to a board of <em>challenges</em>, ranging from easy to nigh-impossible, and scored appropriately. Whoever earns the most points by solving challenges wins!  The in-person part of the event will take place in room 206 of the Public Policy Building.</p><p>The CTF will begin at <strong>1:00 PM EDT on Friday, April 29, 2022</strong>, and end at <strong>1:00 PM EDT on Sunday, May 1, 2022</strong>, for a total runtime of 48 hours. The maximum team size is <strong>four</strong>. There will be an in-person component <strong>for UMBC participants only</strong>.</p><p>At 8:00 PM on Friday, April 29<sup>th</sup> (7 hours after the start), we will give out some prizes to UMBC competitors, depending on their current position on the scoreboard at 8:00 PM. <strong>Only UMBC competitors will be eligible for these prizes.</strong> Don’t worry, they’ll be small prizes, mostly just for fun, and the clout and CTFtime credit will go to the “official” winners at competition closing time (1 pm on Sunday).</p><h2><strong>See the <a href="https://umbccd.net/" rel="nofollow external" class="bo">Dawg CTF 2022 site</a> to register, get more information, and  join the Discord server</strong>.</h2></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/04/cybersecurity-ctf-competition-starts-1pm-friday-4-29/" rel="nofollow external" class="bo">Cybersecurity CTF competition starts 1pm Friday 4/29</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyberdawgs will host a 48-hour Jeopardy-style Capture The Flag cybersecurity competition, online and in person for UMBC participants.  DawgCTF 2022 will be a Jeopardy-style CTF, so things...</Summary>
<Website>https://www.csee.umbc.edu/2022/04/cybersecurity-ctf-competition-starts-1pm-friday-4-29/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/118961/guest@my.umbc.edu/d778738d7a814069f2cb98ffc80417c0/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 26 Apr 2022 22:47:03 -0400</PostedAt>
<EditAt>Tue, 26 Apr 2022 22:47:03 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="129854" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129854">
<Title>UMBC researchers publish book on Cybersecurity &amp; Local Government</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/newbook_slider.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/newbook_slider-1024x461.jpg" alt="" style="max-width: 100%; height: auto;"></a>Local governments are particularly enticing soft targets, often lacking resources to defend themselves against routine cyberattacks.<h1><strong>UMBC researchers publish book on</strong><br><strong>Cybersecurity and Local Government</strong></h1><p>UMBC researchers <a href="https://publicpolicy.umbc.edu/donald-f-norris/" rel="nofollow external" class="bo">Donald Norris</a>, <a href="https://www.linkedin.com/in/laura-mateczun/" rel="nofollow external" class="bo">Laura Mateczun</a>, and <a href="https://cybersecurity.umbc.edu/richard-forno/" rel="nofollow external" class="bo">Richard Forno</a> have published a new book on the the risks of cyberattacks that local governments face and how they are addressing them.  Their book <strong><a href="https://www.wiley.com/en-us/Cybersecurity+and+Local+Government-p-9781119788287" rel="nofollow external" class="bo">Cybersecurity and Local Government</a> </strong>published by WIley summarizes several years of research and surveys on the issues and practices of city, county, and state governments.</p><p>Some of this is summarised in a recent article by Forno in The Conversation, <strong><a href="https://theconversation.com/local-governments-are-attractive-targets-for-hackers-and-are-ill-prepared-179073" rel="nofollow external" class="bo">Local governments are attractive targets for hackers and are ill-prepared</a></strong>.</p><p>Donald  Norris is Professor Emeritus and former chair of UMBC’s School of Public Policy, Laura Mateczun, JD, is a PhD student in Public Policy, and Richard Forno is a Principal Lecturer and director of UMBC’s Graduate Cybersecurity Program and Assistant Director of UMBC’s Center for Cybersecurity.</p></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/04/umbc-researchers-publish-book-on-cybersecurity-local-government/" rel="nofollow external" class="bo">UMBC researchers publish book on Cybersecurity &amp; Local Government</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Local governments are particularly enticing soft targets, often lacking resources to defend themselves against routine cyberattacks. UMBC researchers publish book on Cybersecurity and Local...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/04/umbc-researchers-publish-book-on-cybersecurity-local-government/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129854/guest@my.umbc.edu/7b5ff41f73357103dac1e785c754b9fd/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 17 Apr 2022 15:34:43 -0400</PostedAt>
<EditAt>Sun, 17 Apr 2022 15:34:43 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="118651" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/118651">
<Title>UMBC researchers publish book on Cybersecurity &amp; Local Government</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/newbook_slider.jpg" rel="nofollow external" class="bo"><img width="1024" height="461" src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/newbook_slider-1024x461.jpg" alt="" style="max-width: 100%; height: auto;"></a>Local governments are particularly enticing soft targets, often lacking resources to defend themselves against routine cyberattacks.<h1><strong>UMBC researchers publish book on</strong><br><strong>Cybersecurity and Local Government</strong></h1><p>UMBC researchers <a href="https://publicpolicy.umbc.edu/donald-f-norris/" rel="nofollow external" class="bo">Donald Norris</a>, <a href="https://www.linkedin.com/in/laura-mateczun/" rel="nofollow external" class="bo">Laura Mateczun</a>, and <a href="https://cybersecurity.umbc.edu/richard-forno/" rel="nofollow external" class="bo">Richard Forno</a> have published a new book on the the risks of cyberattacks that local governments face and how they are addressing them.  Their book <strong><a href="https://www.wiley.com/en-us/Cybersecurity+and+Local+Government-p-9781119788287" rel="nofollow external" class="bo">Cybersecurity and Local Government</a> </strong>published by WIley summarizes several years of research and surveys on the issues and practices of city, county, and state governments.</p><p>Some of this is summarised in a recent article by Forno in The Conversation, <strong><a href="https://theconversation.com/local-governments-are-attractive-targets-for-hackers-and-are-ill-prepared-179073" rel="nofollow external" class="bo">Local governments are attractive targets for hackers and are ill-prepared</a></strong>.</p><p>Donald  Norris is Professor Emeritus and former chair of UMBC’s School of Public Policy, Laura Mateczun, JD, is a PhD student in Public Policy, and Richard Forno is a Principal Lecturer and director of UMBC’s Graduate Cybersecurity Program and Assistant Director of UMBC’s Center for Cybersecurity.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/04/umbc-researchers-publish-book-on-cybersecurity-local-government/" rel="nofollow external" class="bo">UMBC researchers publish book on Cybersecurity &amp; Local Government</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Local governments are particularly enticing soft targets, often lacking resources to defend themselves against routine cyberattacks. UMBC researchers publish book on Cybersecurity and Local...</Summary>
<Website>https://www.csee.umbc.edu/2022/04/umbc-researchers-publish-book-on-cybersecurity-local-government/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/118651/guest@my.umbc.edu/b8bf7445a75567b0117e0f00265461e4/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 17 Apr 2022 15:34:43 -0400</PostedAt>
<EditAt>Sun, 17 Apr 2022 15:34:43 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="129855" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129855">
<Title>talk: Designing Quantum Resistant KeyExchange Protocols with CPSA, 12-1 Fri 4/15, online</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/quantum-crypto.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/quantum-crypto-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a>With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols<h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h1><strong>Designing Quantum Resistant Key<br>Exchange Protocols with CPSA</strong></h1><h2><strong>Dr. Edward Zieglar, CSEE, UMBC</strong></h2><h3><strong>12–1 pm, Friday, 15 April 2022</strong><br>online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h3><p>With developments in quantum computers and algorithms, the public-key systems that we rely upon for secure network communication will become vulnerable to exploitation. Quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols. Much of the work has focused on developing new mathematical problems that are conjectured to be quantum-resistant as replacements for our current public-key algorithms. We took a different approach, looking to an old secret-key agreement protocol developed by Leighton and Micali at MIT for the <a href="https://en.wikipedia.org/wiki/Clipper_chip" rel="nofollow external" class="bo">Clipper Chip</a> symmetric encryption system. We will present our analysis of the Leighton-Micali key agreement protocol, weaknesses we uncovered with the Cryptographic Protocol Shapes Analyzer (CPSA), and verification of a new protocol based on their ideas that corrects deficiencies in the original protocol.</p><p>Dr. Zieglar is an expert in protocol analysis and computer security at the National Security Agency. He is an adjunct faculty member at UMBC and a member of the UMBC Protocol Analysis Lab. Dr. Zieglar earned his Ph.D. in computer science from UMBC working under Dr. Sidhu. Email: <a href="mailto:eziegl1@umbc.edu">eziegl1@umbc.edu</a></p><p>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings: April 29, Ian Blumenfeld (UMBC), May 13, Enka Blanchard (Digitrust Loria, France).</p></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/04/talk-designing-quantum-resistant-keyexchange-protocols-with-cpsa-12-1-fri-4-15-online/" rel="nofollow external" class="bo">talk: Designing Quantum Resistant KeyExchange Protocols with CPSA, 12-1 Fri 4/15, online</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols The UMBC Cyber Defense Lab presents...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/04/talk-designing-quantum-resistant-keyexchange-protocols-with-cpsa-12-1-fri-4-15-online/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129855/guest@my.umbc.edu/74b27f1cfa2abf4a1e3e49e7f47ece4e/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>quantum-computing</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 11 Apr 2022 15:30:28 -0400</PostedAt>
<EditAt>Mon, 11 Apr 2022 15:30:28 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="118396" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/118396">
<Title>talk: Designing Quantum Resistant KeyExchange Protocols with CPSA, 12-1 Fri 4/15, online</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/quantum-crypto.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/quantum-crypto-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a>With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols<h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h1><strong>Designing Quantum Resistant Key<br>Exchange Protocols with CPSA</strong></h1><h2><strong>Dr. Edward Zieglar, CSEE, UMBC</strong></h2><h3><strong>12–1 pm, Friday, 15 April 2022</strong><br>online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h3><p>With developments in quantum computers and algorithms, the public-key systems that we rely upon for secure network communication will become vulnerable to exploitation. Quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols. Much of the work has focused on developing new mathematical problems that are conjectured to be quantum-resistant as replacements for our current public-key algorithms. We took a different approach, looking to an old secret-key agreement protocol developed by Leighton and Micali at MIT for the <a href="https://en.wikipedia.org/wiki/Clipper_chip" rel="nofollow external" class="bo">Clipper Chip</a> symmetric encryption system. We will present our analysis of the Leighton-Micali key agreement protocol, weaknesses we uncovered with the Cryptographic Protocol Shapes Analyzer (CPSA), and verification of a new protocol based on their ideas that corrects deficiencies in the original protocol.</p><p>Dr. Zieglar is an expert in protocol analysis and computer security at the National Security Agency. He is an adjunct faculty member at UMBC and a member of the UMBC Protocol Analysis Lab. Dr. Zieglar earned his Ph.D. in computer science from UMBC working under Dr. Sidhu. Email: *protected email*</p><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings: April 29, Ian Blumenfeld (UMBC), May 13, Enka Blanchard (Digitrust Loria, France).</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/04/talk-designing-quantum-resistant-keyexchange-protocols-with-cpsa-12-1-fri-4-15-online/" rel="nofollow external" class="bo">talk: Designing Quantum Resistant KeyExchange Protocols with CPSA, 12-1 Fri 4/15, online</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols The UMBC Cyber Defense Lab presents...</Summary>
<Website>https://www.csee.umbc.edu/2022/04/talk-designing-quantum-resistant-keyexchange-protocols-with-cpsa-12-1-fri-4-15-online/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/118396/guest@my.umbc.edu/9d16aa9a4995c46bfa5cf72d425c0ffb/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>quantum-computing</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 11 Apr 2022 15:30:28 -0400</PostedAt>
<EditAt>Mon, 11 Apr 2022 15:30:28 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="129856" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129856">
<Title>talk: Formal Methods Analysis of the Session Binding Proxy Protocol, 12-1 Fri 4/1</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/03/Prevent_Session_Hijacking_by_Binding_the_Session_to_the_Cryptographic_Network_Credentials-NORDSEC_2013-2.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/03/Prevent_Session_Hijacking_by_Binding_the_Session_to_the_Cryptographic_Network_Credentials-NORDSEC_2013-2-1024x323.jpg" alt="" style="max-width: 100%; height: auto;"></a>Session Binding Proxy protocol aims to prevent session hijacking by binding the application session to the underlying network session <h3>The UMBC Cyber Defense Lab presents</h3><h2><strong>A Formal Methods Analysis of the Session Binding Proxy Protocol</strong></h2><h2><strong>Kirellos N. Abou Elsaad, UMBC</strong></h2><h3>12-1 pm, Friday, 1 April 2022, via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </h3><p>Proposed by Burgers, Verdult, and Eekelen in 2013, the Session Binding Proxy (SBP) protocol intends to prevent session hijacking by binding the application session to the underlying network session (i.e., binding the session token to the SSL/TLS shared key). We present a formal methods analysis of SBP using the Cryptographic Protocol Shapes Analyzer (CPSA). Our analysis reveals that SBP relies critically on the successful establishment of a secure SSL/TLS channel, which can be undermined using well-known attacks. Also, we find that SBP allows for the partial hijacking of a session using a tailgating attack. In this attack, the adversary uses the server to inject and execute malicious code inside the client’s browser to extract the session token and forge a valid state-changing request to the server. This attack is not neutralized by SBP because the request contains a valid session token and is sent over the client’s existing SSL/TLS channel.</p><p>Kirellos N. Abou Elsaad is a master’s student in computer science at UMBC working under Dr. Sherman and a member of the Protocol Analysis Lab (PAL). email: <a href="mailto:abou3@umbc.edu">abou3@umbc.edu</a></p><p>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings: April 15, Edward Zieglar (NSA); April 29, Ian Blumenfeld (UMBC); May 13, Enka Blanchard (Digitrust Loria, France).</p></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/03/talk-formal-methods-analysis-of-the-session-binding-proxy-protocol-12-1-fri-4-1/" rel="nofollow external" class="bo">talk: Formal Methods Analysis of the Session Binding Proxy Protocol, 12-1 Fri 4/1</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Session Binding Proxy protocol aims to prevent session hijacking by binding the application session to the underlying network session  The UMBC Cyber Defense Lab presents  A Formal Methods...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/03/talk-formal-methods-analysis-of-the-session-binding-proxy-protocol-12-1-fri-4-1/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129856/guest@my.umbc.edu/b130e6dfb565f94a7272a64c5f0ad7d5/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 27 Mar 2022 22:09:22 -0400</PostedAt>
<EditAt>Sun, 27 Mar 2022 22:09:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="117941" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/117941">
<Title>talk: Formal Methods Analysis of the Session Binding Proxy Protocol, 12-1 Fri 4/1</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/03/Prevent_Session_Hijacking_by_Binding_the_Session_to_the_Cryptographic_Network_Credentials-NORDSEC_2013-2.jpg" rel="nofollow external" class="bo"><img width="1024" height="323" src="https://www.csee.umbc.edu/wp-content/uploads/2022/03/Prevent_Session_Hijacking_by_Binding_the_Session_to_the_Cryptographic_Network_Credentials-NORDSEC_2013-2-1024x323.jpg" alt="" style="max-width: 100%; height: auto;"></a>Session Binding Proxy protocol aims to prevent session hijacking by binding the application session to the underlying network session <h3>The UMBC Cyber Defense Lab presents</h3><h2><strong>A Formal Methods Analysis of the Session Binding Proxy Protocol</strong></h2><h2><strong>Kirellos N. Abou Elsaad, UMBC</strong></h2><h3>12-1 pm, Friday, 1 April 2022, via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </h3><p>Proposed by Burgers, Verdult, and Eekelen in 2013, the Session Binding Proxy (SBP) protocol intends to prevent session hijacking by binding the application session to the underlying network session (i.e., binding the session token to the SSL/TLS shared key). We present a formal methods analysis of SBP using the Cryptographic Protocol Shapes Analyzer (CPSA). Our analysis reveals that SBP relies critically on the successful establishment of a secure SSL/TLS channel, which can be undermined using well-known attacks. Also, we find that SBP allows for the partial hijacking of a session using a tailgating attack. In this attack, the adversary uses the server to inject and execute malicious code inside the client’s browser to extract the session token and forge a valid state-changing request to the server. This attack is not neutralized by SBP because the request contains a valid session token and is sent over the client’s existing SSL/TLS channel.</p><p>Kirellos N. Abou Elsaad is a master’s student in computer science at UMBC working under Dr. Sherman and a member of the Protocol Analysis Lab (PAL). email: *protected email*</p><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings: April 15, Edward Zieglar (NSA); April 29, Ian Blumenfeld (UMBC); May 13, Enka Blanchard (Digitrust Loria, France).</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/03/talk-formal-methods-analysis-of-the-session-binding-proxy-protocol-12-1-fri-4-1/" rel="nofollow external" class="bo">talk: Formal Methods Analysis of the Session Binding Proxy Protocol, 12-1 Fri 4/1</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Session Binding Proxy protocol aims to prevent session hijacking by binding the application session to the underlying network session  The UMBC Cyber Defense Lab presents  A Formal Methods...</Summary>
<Website>https://www.csee.umbc.edu/2022/03/talk-formal-methods-analysis-of-the-session-binding-proxy-protocol-12-1-fri-4-1/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/117941/guest@my.umbc.edu/861b4e6a10082187cd2eab14589cd84e/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 27 Mar 2022 22:09:22 -0400</PostedAt>
<EditAt>Sun, 27 Mar 2022 22:09:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="117738" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/117738">
<Title>talk: CyMOT Cybersecurity Training for Operational Technology in Manufacturing, 12-1 Fri 3/18</Title>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/03/cymot3.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2022/03/cymot3-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h2><strong>CyMOT: Cybersecurity Training for</strong><br><strong>Operational Technology in Manufacturing</strong></h2><h3><strong>Nilanjan Banerjee, UMBC CSEE</strong></h3><h3><strong>12-1 pm Friday, 18 March 2022, via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </strong></h3><p>The University of Maryland, Baltimore County (UMBC) and <a href="https://www.mxdusa.org/" rel="nofollow external" class="bo">MxD</a> Learn, the workforce arm of MxD, seeks to collaboratively build Phase I of <a href="https://cymot.org/" rel="nofollow external" class="bo">CyMOT</a> to address the need for cybersecurity for operational manufacturing technology (OT). Leveraging MxD Learn’s previous work identifying the skills and abilities needed in future manufacturing positions and the development and dissemination of training opportunities and career pathways, MxD Learn has partnered with UMBC, a leader in cybersecurity education, to create a curriculum that targets adult learners who are looking to increase their skills at the intersection of cybersecurity and manufacturing. The objective of the curriculum program is to provide current workers with learning opportunities that result in certification(s), giving them the tools necessary to execute careers in cybersecurity in manufacturing, and increasing the security of U.S. manufacturers from cyber attacks. This talk will describe the CyMOT Phase I pilot.</p><p>Dr. <a href="https://www.csee.umbc.edu/~nilanb/" rel="nofollow external" class="bo">Nilanjan Banerjee</a> is a professor of CSEE at UMBC. His area of expertise is in cybersecurity in manufacturing and physiological sensing.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings: April 1, Kirellos Elsaad (UMBC); April 15, Edward Zieglar (NSA); April 29, Ian Blumenfeld (UMBC); May 13, Enka Blanchard (Digitrust Loria, France).</p>
    <p>The post <a href="https://www.csee.umbc.edu/2022/03/talk-cymot-cybersecurity-training-for-operational-technology-in-manufacturing-12-1-fri-3-18/" rel="nofollow external" class="bo">talk: CyMOT Cybersecurity Training for Operational Technology in Manufacturing, 12-1 Fri 3/18</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  CyMOT: Cybersecurity Training for Operational Technology in Manufacturing  Nilanjan Banerjee, UMBC CSEE  12-1 pm Friday, 18 March 2022, via WebEx   The...</Summary>
<Website>https://www.csee.umbc.edu/2022/03/talk-cymot-cybersecurity-training-for-operational-technology-in-manufacturing-12-1-fri-3-18/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/117738/guest@my.umbc.edu/131dff771a479f4611509c8f1f94caa6/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 15 Mar 2022 12:10:20 -0400</PostedAt>
<EditAt>Tue, 15 Mar 2022 12:10:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="117336" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/117336">
<Title>talk: Ted Selker on Voting Technology, 12-1, Fri 3/4</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/03/vote.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2022/03/vote-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><h4>The UMBC Cyber Defense Lab presents</h4><h1><strong>Voting Technology</strong></h1><h2><strong>Ted Selker</strong></h2><h3>Research Professor<br>UMBC CSEE Department</h3><h3>12–1 ET Friday, 4 March 2022 via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h3><p>Traditionally most votes are lost in registration, voting ballot design problems, and polling place operations, causing long lines and possibly mail-in ballot fraud. This talk will describe voting-process problems and technological problems, and some possible solutions for voting improvement. Voting disenfranchisement is much higher for people with perceptual, physical, and cognitive disabilities. More than 14% of registered voters are in danger of increased errors due to dyslexia, and more than 6.5% due to short-term memory problems. We will describe and demonstrate technologies we are making that help disabled people and improve voting universally as well.</p><p><a href="http://ted.selker.com/" rel="nofollow external" class="bo">Dr. Ted Selker</a> is an entrepreneur inventor who also mentors innovation. Ted spent five years as director of Considerate Systems research at Carnegie Mellon University Silicon Valley and in developing the campus’s research mission. Prior to that, Ted spent ten years as an associate professor at the MIT Media Laboratory, where he created the Context Aware Computing group, co-directed the Caltech/MIT Voting Technology Project, and directed the Industrial Design Intelligence future for product design project. Prior to that, his successes at targeted product creation and enhancement at IBM earned him the role of IBM Fellow. Ted’s work birthed successful products ranging from notebook computers to operating systems. It accumulated numerous awards, patents, and papers and has often been featured in the press. Ted is co-recipient of the Computer Science Policy Leader Award for Scientific American 50, the American Association for People with Disabilities Thomas Paine Award for his work on voting technology, and the Telluride Tech Fest Award.</p><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public. Upcoming CDL Meetings: March 18, Nilanjan Banerjee (UMBC); April 1, Kirellos Elsaad (UMBC); April 15, Edward Zieglar (NSA); April 29, Ian Blumenfeld (UMBC); May 13, Enka Blanchard (Digitrust Loria, France)</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/03/talk-ted-selker-on-voting-technology-12-1-fri-3-4/" rel="nofollow external" class="bo">talk: Ted Selker on Voting Technology, 12-1, Fri 3/4</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Voting Technology  Ted Selker  Research Professor UMBC CSEE Department  12–1 ET Friday, 4 March 2022 via WebEx  Traditionally most votes are lost in...</Summary>
<Website>https://www.csee.umbc.edu/2022/03/talk-ted-selker-on-voting-technology-12-1-fri-3-4/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/117336/guest@my.umbc.edu/fb281d4e792d98468bd4ac5c35399e68/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 01 Mar 2022 12:47:04 -0500</PostedAt>
<EditAt>Tue, 01 Mar 2022 12:47:04 -0500</EditAt>
</NewsItem>

</News>
