<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Wed, 22 Apr 2026 01:18:51 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=alumni">
<NewsItem contentIssues="true" id="99052" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99052">
<Title>talk: Dr. Richard Carback on Startup Lessons Learned, 12-1 Fri 2/12</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/startups.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/startups-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4>The UMBC Cyber Defense Lab presents</h4><h1><strong>Startup Lessons Learned</strong></h1><h3><strong>Richard Carback (Ph.D. UMBC CS 2010)</strong><br><strong>xx network</strong></h3><h4><strong>12:00–1:00pm ET, Friday,12 February 12 2021<br>WebEx:<a href="https://www.google.com/url?q=https://umbc.webex.com/meet/sherman&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw25rwcPisd9EH3SQYAqxmvd" rel="nofollow external" class="bo"> https://umbc.webex.com/meet/sherman</a></strong></h4><hr><p>This talk will explore the technology and lessons learned by UMBC alumnus Richard Carback from his experience co-founding and closing the security startup Lexumo, which provided the only automated service that continuously monitors IoT software platforms for the latest public vulnerabilities. In addition to covering some of the hard problems and Lexumo’s technical approach for monitoring all the world’s open-source software to assist companies in managing their vulnerabilities, Dr. Carback will discuss the mistakes and complexities of getting funded, delivering a product, and finding customers.</p><p><a href="https://www.linkedin.com/in/richard-carback-8157678/" rel="nofollow external" class="bo">Dr. Richard Carback</a> is a UMBC Alumnus (CS Ph.D., 2010) who is an entrepreneur who currently runs a private consultancy for computer security, computer forensics, cryptography, and smart contracts. He is a privacy-preserving systems expert with a background in elections and anonymity networks. While the group leader for the embedded systems security group at Charles Stark Draper Laboratories, he spun out an IoT vulnerability startup called Lexumo that provided the only automated service that continuously monitored IoT software platforms for the latest public vulnerabilities. At UMBC, he worked with Alan Sherman on secure elections and was the primary researcher behind Takoma Park’s deployment of the Scantegrity voting system, the first usage of voter-verifiable end-to-end election technology in a municipal election. email: *protected email*</p><p>Host: Alan T. Sherman, *protected email*. Support for this event was provided in part by the NSF under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings:</p><ul><li>Feb 26, Vahid Heydari (Rowan University)</li><li>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security</li><li>Mar 26, Jeremy Clark (Concordia)</li><li>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game</li><li>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking</li><li>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</li></ul></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/talk-dr-richard-carback-on-startup-lessons-learned-12-1-fri-2-12/" rel="nofollow external" class="bo">talk: Dr. Richard Carback on Startup Lessons Learned, 12-1 Fri 2/12</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Startup Lessons Learned  Richard Carback (Ph.D. UMBC CS 2010) xx network  12:00–1:00pm ET, Friday,12 February 12 2021 WebEx:...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/talk-dr-richard-carback-on-startup-lessons-learned-12-1-fri-2-12/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99052/guest@my.umbc.edu/afa1dc13cc981b15aed9bf7eccba5300/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 07 Feb 2021 21:30:34 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="99049" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99049">
<Title>Two UMBC alumnae featured in Cybersecurity podcast</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/podcast.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/podcast-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h2>Two UMBC alumnae featured in The CyberWire podcast</h2><hr><p>The CyberWire produced a special podcast, <a href="https://thecyberwire.com/podcasts/special-edition/39/notes" rel="nofollow external" class="bo"><strong>In the clear: what it’s like working as a woman in the cleared community</strong>,</a> that features three women working on cybersecurity atNorthrop Grumman. Two are UMBC alumnae, software engineering manager <a href="https://www.linkedin.com/in/laurenmazzoli/" rel="nofollow external" class="bo">Lauren</a> and cyber software engineer <a href="https://www.linkedin.com/in/priyanka-ranade/" rel="nofollow external" class="bo">Priyanka</a>. </p><p>Lauren received a BS in Computer Science in 2015 and an M.S. in Computer Science in 2017.  As an undergraduate student, she worked part-time as an IT Security Analyst tracking, locating, and performing forensics on infected computers located on campus.  She joined Northrop Grumman in 2015 and continued her studies as a part-time graduate student, doing research on investigating different ways of characterizing cybersecurity exploit kits and the malware they produce.</p><p>Priyanka received a BS in Computer Science in 2018 and an MS in Computer Science in 2019. Her MS research was on multilingual text alignment for cybersecurity.  She has been a lecture in the UMBC Computer Science program and the UMD Advanced Cybersecurity Experience for Students (<a href="https://aces.umd.edu/" rel="nofollow external" class="bo">ACES</a>) program. She is currently working on a Computer Science Ph.D. at UMBC focused on how AI can help protect cybersecurity systems from data poisoning attacks.</p><hr><h4><strong>Listen to the 47 minute podcast <a href="https://thecyberwire.com/podcasts/special-edition/39/notes" rel="nofollow external" class="bo">here</a>.</strong></h4></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/two-umbc-alumnae-featured-in-cybersecurity-podcast/" rel="nofollow external" class="bo">Two UMBC alumnae featured in Cybersecurity podcast</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Two UMBC alumnae featured in The CyberWire podcast   The CyberWire produced a special podcast, In the clear: what it’s like working as a woman in the cleared community, that features three women...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/two-umbc-alumnae-featured-in-cybersecurity-podcast/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99049/guest@my.umbc.edu/8cbe836bf34d307b2d78936645d9ea5b/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 07 Feb 2021 20:19:43 -0500</PostedAt>
<EditAt>Sun, 07 Feb 2021 20:19:43 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="96415" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96415">
<Title>talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/dc_blockchain_tweet-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h3>UMBC Data Science Meetup Talk</h3><h1><strong>Exploding Blockchain Myths</strong></h1><h3><strong>Maria Vachino and Dr. James P. Howard</strong></h3><h3>5:30-7:00pm Tuesday, 13 October 2020</h3><hr><p>In this talk, Maria Vachino from Easy Dynamics and Dr. James P. Howard from APL will provide an overview of what blockchain is and isn’t, focusing on non-cryptocurrency use cases, will explain the results of their research for the DHS S&amp;T Cybersecurity Directorate, and will provide insight into the value (or lack therefore) of the technology. </p><p>References:<br>  • <a href="https://ieeexplore.ieee.org/document/8965252/" rel="nofollow external" class="bo">https://ieeexplore.ieee.org/document/8965252/</a><br>  • <a href="http://jitm.ubalt.edu/XXX-3/article3.pdf" rel="nofollow external" class="bo">http://jitm.ubalt.edu/XXX-3/article3.pdf</a></p><p><a href="https://www.linkedin.com/in/mariavachino/" rel="nofollow external" class="bo">Maria Vachino</a> is the Director of Digital Identity at <a href="https://www.easydynamics.com/" rel="nofollow external" class="bo">Easy Dynamics</a> where she is focused on Identity Credential &amp; Access Management (ICAM) technologies, policies, &amp; standards, Cybersecurity, and IT modernization for the US Federal Government. She started investigating applications for blockchain technology in 2015 as the Technical and Government Engagement Lead for the DHS S&amp;T Cyber Security Directorate’s Identity Management Research &amp; Development Program while a member of the Senior Professional Staff at the Johns Hopkins Applied Physics Lab. Maria has a BS in Computer Science from UMBC and an MS in Cybersecurity.</p><p>Dr. <a href="https://www.linkedin.com/in/k3jph/" rel="nofollow external" class="bo">James P. Howard, II</a> (UMBC Ph.D. ’14) is a scientist at the <a href="https://www.jhuapl.edu/" rel="nofollow external" class="bo">Johns Hopkins Applied Physics Laboratory</a>. Previously, he was a consultant to numerous government agencies, including the Securities and Exchange Commission, the Executive Office of the President, and the United States Department of Homeland Security, and worked for the Board of Governors of the Federal Reserve System as an internal consultant on scientific computing. He is a passionate educator, teaching mathematics and statistics at the University of Maryland Global Campus since 2010 and has taught public management at Central Michigan University, Penn State, and the University of Baltimore. His most recent work has modeled the spread of infectious respiratory diseases and Ebolavirus, predicted global disruptive events, researched using blockchain for government services, and created devices for rescuing victims of building collapse. He is the author of two books.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/" rel="nofollow external" class="bo">talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Data Science Meetup Talk  Exploding Blockchain Myths  Maria Vachino and Dr. James P. Howard  5:30-7:00pm Tuesday, 13 October 2020   In this talk, Maria Vachino from Easy Dynamics and Dr....</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96415/guest@my.umbc.edu/097b844dc5ba2983199d05604cc47309/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 06 Oct 2020 20:58:09 -0400</PostedAt>
<EditAt>Tue, 06 Oct 2020 20:58:09 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="76057" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/76057">
<Title>talk: SPARCLE: Practical Homomorphic Encryption, 12pm Fri 4/27</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/04/keys.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/04/keys.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p><strong>UMBC Cyber Defense Lab</strong></p>
    <h1><strong>SPARCLE: Practical Homomorphic Encryption</strong></h1>
    <h2><strong>Russ Fink</strong></h2>
    <h3><strong> Senior Scientist</strong><br><strong> Johns Hopkins University / Applied Physics Laboratory</strong></h3>
    <h3><strong>12:00–1:00pm Friday, April 27, 2018, ITE 237, UMBC</strong></h3>
    <p>In the newly coined Privacy Age, researchers are building systems with homomorphic algorithms that enable “never decrypt” operations on sensitive data in applications such as computational private information retrieval (cPIR). The trouble is, the leading algorithms incur significant computational and space challenges, relegating them mainly to large cloud computing platforms. We have invented a special-purpose, ring-homomorphic (aka, “fully homomorphic”) algorithm that, owing to some specializing assumptions, trades general-purpose cryptographic utility for linear performance in speed and space.</p>
    <p>We will present the cryptosystem and discuss several current challenges. We will also throw in a fun, simple, tactile concept demonstration of PIR for those just generally curious about what all this is, hopefully demystifying how you can enable a server to search for something without knowing what it’s looking for, and without knowing what (if any) results it found.</p>
    <p>Russ Fink (UMBC ’10) is a senior scientist at the Johns Hopkins University / Applied Physics Laboratory. His current research interests include private information retrieval, applied cryptography, and cyber security.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/04/umbc-cybersecurity-talk-sparcle-practical-homomorphic-encryption-12pm-fri-4-27/" rel="nofollow external" class="bo">talk: SPARCLE: Practical Homomorphic Encryption, 12pm Fri 4/27</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab   SPARCLE: Practical Homomorphic Encryption   Russ Fink    Senior Scientist  Johns Hopkins University / Applied Physics Laboratory   12:00–1:00pm Friday, April 27, 2018, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2018/04/umbc-cybersecurity-talk-sparcle-practical-homomorphic-encryption-12pm-fri-4-27/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/76057/guest@my.umbc.edu/ddd021406cf0d2d9753550e1189845d6/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 25 Apr 2018 14:09:26 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72825" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72825">
<Title>UMBC faculty, alumni and partners discuss cybersecurity and industry challenges</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2017/12/CyberPressEvent_3.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/12/CyberPressEvent_3.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1><strong>UMBC faculty, alumni and corporate partners discuss cybersecurity and industry challenges</strong></h1>
    <p>Cybersecurity is regularly a headliner in the news, especially when personal information stored online has been compromised, whether through a breach, hack, or threat. On Thursday, December 7, UMBC hosted experts from industry and academia at the National Press Club to discuss the cyber challenges professionals face, and how those groups can work together to prepare future generations of cybersecurity professionals.</p>
    <p>Scott Shane, a reporter with <em>The New York Times</em>, led the discussion with five panelists representing industry, small business, and higher education. “I think it’s fair to say the internet was built without adequate attention to security,” stated Shane, who writes about cyber and information attacks regularly. “It’s almost like somebody who starts a bank with branches all over the world, and after it’s up and running and has millions of account holders, suddenly starts to think about safes, locks on the doors and bulletproof glass. I think that’s sort of the stage that we’re at right now.”</p>
    <p>UMBC President <strong>Freeman Hrabowski </strong>and <strong>Anupam Joshi</strong>, professor and chair of computer science and electrical engineering, and director of the Center for Cybersecurity at UMBC, were joined by alumni and partners who have been working on the challenge of educating the workforce together. Hrabowski explained that there are currently about 350,000 unfilled cybersecurity jobs, and that number is expected to continue to grow. By 2021, it is anticipated that there will be approximately three million job openings in cyber-related fields.</p>
    <p>Over the course of his professional career, Nigel Faulkner, chief technology officer at T. Rowe Price, has experienced the emergence of technology and many changes. “As the CTO of a medium-large company, cyber is a defensive investment for us. The best thing that can happen is nothing happens,” Faulkner said, adding that he is always thinking about whether the company is investing enough, doing the right thing, and making the right connections in the industry to keep clients’ information safe.</p>
    <p>As president and founder of TCecure, LLC, and cybersecurity academic innovation officer for University System of Maryland (USM), <strong>Tina Williams</strong> ’02, computer science, shared the importance of building security into technology from the beginning, rather than adding these features on at the “tail end of a development cycle.” Not only does her company handle security, they also monitor threats and risks that can compromise the technology’s health. In her role at USM, Williams represents the system as a whole to integrate academia and academic research, relationships, and resources into what’s taking place nationally, at the Federally Funded Research and Development Centers.</p>
    <p>As head of UMBC’s Center for Cybersecurity, Joshi explained that UMBC is combating these national challenges by partnering with industry and government leaders to conduct research that addresses specific real-world needs that benefit both. Collaborative relationships, such as UMBC’s work with Northrop Grumman and T. Rowe Price, is one way that UMBC is working to cultivate the next generation of cybersecurity talent.</p>
    <p>As an alumna of UMBC and a current employee at Northrop Grumman, <strong>Lauren Mazzoli </strong>’15, computer science and mathematics, M.S. ’17, computer science, a systems engineer in the Future Technical Leaders Program at Northrop Grumman, discussed her experience in the Cyber Scholars Program. The Cyber Scholars Program works to increase the participation of women and underrepresented minorities in the field. Mazzoli explained that her experience at UMBC, in the Cyber Scholars Program, and working alongside mentors on and off-campus led her to be involved with continuing to encourage women to pursue careers in cybersecurity. “For me it’s been a product of the relationship between academia and industry, that have allowed me to find my own career path, and at the same time help others find theirs,” she explained, noting her passion for helping students consider careers in cybersecurity and related fields.</p>
    <p>“We know there’s a huge workforce that we need and we can’t fill that pipeline. So yes, we need more women, yes, we need students of all backgrounds, but we need diversity of thought, experience, education, and problem-solving skills,” said Mazzoli, adding that it is important for students to know from a young age that cybersecurity is a field they can pursue.</p>
    <p><em>Adapted from a <a href="http://news.umbc.edu/umbc-faculty-alumni-and-corporate-partners-discuss-cybersecurity-and-industry-challenges/" rel="nofollow external" class="bo">UMBC News article</a> article written by <a href="https://oia.umbc.edu/about-us/our-team/person/zr66298/" rel="nofollow external" class="bo">Megan Hanks</a> Photo by Abnet Shiferaw ’11, visual arts. </em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/12/umbc-faculty-alumni-and-partners-discuss-cybersecurity-and-industry-challenges/" rel="nofollow external" class="bo">UMBC faculty, alumni and partners discuss cybersecurity and industry challenges</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    UMBC faculty, alumni and corporate partners discuss cybersecurity and industry challenges   Cybersecurity is regularly a headliner in the news, especially when personal information stored...</Summary>
<Website>https://www.csee.umbc.edu/2017/12/umbc-faculty-alumni-and-partners-discuss-cybersecurity-and-industry-challenges/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72825/guest@my.umbc.edu/dfa76de7478d788248e005724b8a3d28/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 14 Dec 2017 20:39:18 -0500</PostedAt>
</NewsItem>

</News>
