<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Tue, 21 Apr 2026 19:58:10 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=csee">
<NewsItem contentIssues="true" id="111686" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/111686">
<Title>UMBC redesignated a National Center of Academic Excellence in Cyber Defense</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/08/Cae_logo-Badge-1.png" rel="nofollow external" class="bo"><img width="1024" height="511" src="https://www.csee.umbc.edu/wp-content/uploads/2021/08/Cae_logo-Badge-1-1024x511.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h2><strong>UMBC redesignated a National Center of Academic Excellence in Cyber Defense</strong></h2><hr><p>UMBC has been redesignated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) through the academic year 2028.</p><p>The CAE-CD designation indicates that UMBC is helping reduce threats to our national infrastructure by promoting higher education and research in cyber defense and providing the nation with a pipeline of qualified cybersecurity professionals. UMBC is also designated as a Center of Academic Excellence in Cyber Research (CAE-R), which signifies that UMBC increases the understanding of robust cyber defense technology, policy, and practices that will enable our Nation to prevent and respond to a catastrophic event.</p><p>The<a href="https://www.caecommunity.org/" rel="nofollow external" class="bo"> National Centers of Academic Excellence in Cybersecurity</a> (NCAE-C) program is managed by the National Cryptologic School at the National Security Agency. Federal Partners include the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Institute of Standards and Technology (NIST)/National Initiative on Cybersecurity Education (NICE), the National Science Foundation (NSF), the Department of Defense Office of the Chief Information Officer (DoD-CIO), and US Cyber Command (CYBERCOM).</p><p>The NCAE-C program’s  mission is to create and manage a collaborative cybersecurity educational program with community colleges, colleges, and universities that</p><ul><li>Establishes standards for cybersecurity curriculum and academic excellence,</li><li>Includes competency development among students and faculty,</li><li>Values community outreach and leadership in professional development, </li><li>Integrates cybersecurity practice within the institution across academic disciplines,</li><li>Actively engages in solutions to challenges facing cybersecurity education.</li></ul><p>UMBC offers courses, a <a href="https://www.csee.umbc.edu/undergraduate/cmsc-cybersecurity-track/" rel="nofollow external" class="bo">track</a>, and concentrations focused on cybersecurity in its Computer Science and Information Systems programs at the undergraduate and graduate levels. In addition, UMBC has several major <a href="https://cybersecurity.umbc.edu/scholarships/" rel="nofollow external" class="bo">cybersecurity-oriented scholarship programs</a> to prepare the next generation of cybersecurity professionals in an increasingly digital age, focusing on increasing the participation of women and other underrepresented groups in this fast-growing field. These include the UMBC Cyber Scholars program, CyberCorps: Scholarships For Service (SFS) program, and DOD Cyber Scholarship Program (CySP). Applications for SFS cybersecurity scholarships to begin in Fall 2022  are due via<a href="https://scholarships.umbc.edu/retriever/" rel="nofollow external" class="bo"> Scholarship Retriever</a> by 12noon November 15, 2021.</p><p>UMBC also has professional cybersecurity programs that include certificate programs as well as a Master’s of Professional Studies (MPS) degree at its campuses in Catonsville (UMBC main campus) and Rockville (UMBC at the Universities at Shady Grove).  <a href="https://www.umbctraining.com/training-centers/for-individuals/cybersecurity/" rel="nofollow external" class="bo">UMBC Training Centers</a> offers cybersecurity courses for both individuals and organizations.</p><p>Cybersecurity research at UMBC occurs in many of its laboratories and in the <a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo">UMBC Center for Cybersecurity</a> (UCYBR), which recently merged with UMBC’s original cybersecurity center, the UMBC Center for Information Security and Assurance (CISA).</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/08/umbc-redesignated-a-national-center-of-academic-excellence-in-cyber-defense/" rel="nofollow external" class="bo">UMBC redesignated a National Center of Academic Excellence in Cyber Defense</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC redesignated a National Center of Academic Excellence in Cyber Defense   UMBC has been redesignated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) through the academic...</Summary>
<Website>https://www.csee.umbc.edu/2021/08/umbc-redesignated-a-national-center-of-academic-excellence-in-cyber-defense/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/111686/guest@my.umbc.edu/b8874785ca9f862a6e3868a7b1c08931/api/pixel</TrackingUrl>
<Tag>coeit</Tag>
<Tag>csee</Tag>
<Tag>cyberscholars</Tag>
<Tag>cybersecurity</Tag>
<Tag>education</Tag>
<Tag>information-systems</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 20 Aug 2021 17:18:35 -0400</PostedAt>
<EditAt>Fri, 20 Aug 2021 17:18:35 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="99277" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99277">
<Title>Six UMBC faculty, incuding three in CSEE, receive MIPS research awards</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mips2021.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mips2021.png" alt="" style="max-width: 100%; height: auto;"></a><em>Anupam Joshi (left, photo by Marlayna Demond’ 11) and Tina Williams-Koroma, ’02 computer science  (right, photo courtesy of Williams-Koroma)</em><hr><h2><strong>Three CSEE faculty receive MIPS research awards</strong></h2><hr><p>This post is adapted from a UMBC News article <a href="https://news.umbc.edu/umbc-faculty-alumni-entrepreneurs-receive-record-number-of-mips-awards-for-tech-collaborations/" rel="nofollow external" class="bo">UMBC faculty, alumni entrepreneurs receive record-number of MIPS awards for tech collaborations</a> written by Adriana Fraser.</p><p>Six UMBC faculty members have just received grants from the Maryland Industrial Partnerships (MIPS) program to develop new technologies with potential to grow the state’s economy. This is UMBC’s largest number of winning proposals within a single proposal round since MIPS began in 1987. The program connects University System of Maryland (USM) faculty and students with Maryland businesses. UMBC’s latest MIPS grantees include computer science and electrical engineering faculty <strong><a href="https://www.csee.umbc.edu/people/faculty/tim-oates/" rel="nofollow external" class="bo">Tim Oates</a></strong>, <strong><a href="https://www.csee.umbc.edu/people/faculty/chein-i-chang/" rel="nofollow external" class="bo">Chein-I Chang</a></strong>, and <strong>A</strong><a href="https://www.csee.umbc.edu/people/faculty/anupam-joshi/" rel="nofollow external" class="bo"><strong>nupam Joshi</strong>;</a><a href="https://news.umbc.edu/sensing-an-opportunity-to-improve-wind-energy-maryland-innovation-initiative-and-bwtech-help-umbc-faculty-commercialize-their-research/" rel="nofollow external" class="bo"> <strong>Soobum Lee</strong></a>, mechanical engineering; <a href="https://news.umbc.edu/?s=dipanjan" rel="nofollow external" class="bo"><strong>Dipanjan Pan</strong></a>, chemical, biochemical, and environmental engineering; and <strong><a href="https://imet.usmd.edu/directory/vikram-vakharia" rel="nofollow external" class="bo">Vikram Vakharia</a></strong>, marine biotechnology. Among their industry partners are UMBC alumni entrepreneurs who are building businesses in Maryland.</p><p>Joshi, professor and chair of computer science and electrical engineering, received a MIPS grant for a cybersecurity collaboration with the startup <strong><a href="https://cydeploy.com/" rel="nofollow external" class="bo">CyDeploy</a>.</strong> They are developing a platform that automates the quality assurance process for cybersecurity updates made to IT and “internet of things” (IoT) devices like Amazon Alexa, Google Home, and health and medical devices. CyDeploy CEO <strong><a href="https://tcecure.com/tina-williams-koroma/" rel="nofollow external" class="bo">Tina Williams-Koroma</a></strong> ’02, computer science, presented Joshi with the idea to develop a “cybersecurity-driven change management system.” The technology is based on and leverages the use of artificial intelligence and machine learning to create a cloud-based replica of a company’s systems. </p><p>Williams-Koroma and Joshi’s group at UMBC developed a conceptual prototype. It shows the infrastructure and technology that would make the system feasible, combining off-the-shelf tools with novel research. “Increasingly, the government is now beginning to mandate security requirements around IoT devices. The longer-term vision that CyDeploy has is capturing the state of these systems, virtually recreating them and then running the security changes against virtual versions to see how the changes would affect those systems,” Joshi adds. </p><p>Williams-Koroma, who is also an adjunct instructor at UMBC, projects that the initial development of the platform will be complete in late spring 2021. They anticipate launching a free pilot version for businesses to test their IT systems. IoT pilots will come in a later phase.</p><hr><p>Read more about these awards in the UMBC News article <a href="https://news.umbc.edu/umbc-faculty-alumni-entrepreneurs-receive-record-number-of-mips-awards-for-tech-collaborations/" rel="nofollow external" class="bo">UMBC faculty, alumni entrepreneurs receive record-number of MIPS awards for tech collaborations</a>.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/six-umbc-faculty-incuding-three-in-csee-receive-mips-research-awards/" rel="nofollow external" class="bo">Six UMBC faculty, incuding three in CSEE, receive MIPS research awards</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Anupam Joshi (left, photo by Marlayna Demond’ 11) and Tina Williams-Koroma, ’02 computer science  (right, photo courtesy of Williams-Koroma)  Three CSEE faculty receive MIPS research awards   This...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/six-umbc-faculty-incuding-three-in-csee-receive-mips-research-awards/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99277/guest@my.umbc.edu/be762a3ecac75c981fea346f57be054f/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>electrical-engineering</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 13 Feb 2021 12:27:43 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="99052" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99052">
<Title>talk: Dr. Richard Carback on Startup Lessons Learned, 12-1 Fri 2/12</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/startups.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/startups-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4>The UMBC Cyber Defense Lab presents</h4><h1><strong>Startup Lessons Learned</strong></h1><h3><strong>Richard Carback (Ph.D. UMBC CS 2010)</strong><br><strong>xx network</strong></h3><h4><strong>12:00–1:00pm ET, Friday,12 February 12 2021<br>WebEx:<a href="https://www.google.com/url?q=https://umbc.webex.com/meet/sherman&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw25rwcPisd9EH3SQYAqxmvd" rel="nofollow external" class="bo"> https://umbc.webex.com/meet/sherman</a></strong></h4><hr><p>This talk will explore the technology and lessons learned by UMBC alumnus Richard Carback from his experience co-founding and closing the security startup Lexumo, which provided the only automated service that continuously monitors IoT software platforms for the latest public vulnerabilities. In addition to covering some of the hard problems and Lexumo’s technical approach for monitoring all the world’s open-source software to assist companies in managing their vulnerabilities, Dr. Carback will discuss the mistakes and complexities of getting funded, delivering a product, and finding customers.</p><p><a href="https://www.linkedin.com/in/richard-carback-8157678/" rel="nofollow external" class="bo">Dr. Richard Carback</a> is a UMBC Alumnus (CS Ph.D., 2010) who is an entrepreneur who currently runs a private consultancy for computer security, computer forensics, cryptography, and smart contracts. He is a privacy-preserving systems expert with a background in elections and anonymity networks. While the group leader for the embedded systems security group at Charles Stark Draper Laboratories, he spun out an IoT vulnerability startup called Lexumo that provided the only automated service that continuously monitored IoT software platforms for the latest public vulnerabilities. At UMBC, he worked with Alan Sherman on secure elections and was the primary researcher behind Takoma Park’s deployment of the Scantegrity voting system, the first usage of voter-verifiable end-to-end election technology in a municipal election. email: *protected email*</p><p>Host: Alan T. Sherman, *protected email*. Support for this event was provided in part by the NSF under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings:</p><ul><li>Feb 26, Vahid Heydari (Rowan University)</li><li>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security</li><li>Mar 26, Jeremy Clark (Concordia)</li><li>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game</li><li>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking</li><li>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</li></ul></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/talk-dr-richard-carback-on-startup-lessons-learned-12-1-fri-2-12/" rel="nofollow external" class="bo">talk: Dr. Richard Carback on Startup Lessons Learned, 12-1 Fri 2/12</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Startup Lessons Learned  Richard Carback (Ph.D. UMBC CS 2010) xx network  12:00–1:00pm ET, Friday,12 February 12 2021 WebEx:...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/talk-dr-richard-carback-on-startup-lessons-learned-12-1-fri-2-12/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99052/guest@my.umbc.edu/afa1dc13cc981b15aed9bf7eccba5300/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 07 Feb 2021 21:30:34 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="96902" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96902">
<Title>talk: Secure Computation: From Theory to Practice, 12-1pm Oct 30</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="511" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/katz-1024x511.png" alt="" style="max-width: 100%; height: auto;"><hr><h5><strong>UMBC Cyber Defense Lab presents</strong></h5><hr><h2><strong>Secure Computation: From Theory to Practice</strong></h2><h3><strong>Jonathan Katz</strong></h3><h3><strong>Computer Science Department<br>University of Maryland, College Park</strong></h3><h3><strong>12:00–1:00 pm EDT, Friday, 30 October 2020</strong><br>Online via <a href="https:://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">Webex</a> </h3><hr><p>Protocols for secure multi-party computation (<a href="https://en.wikipedia.org/wiki/Secure_multi-party_computation" rel="nofollow external" class="bo">MPC</a>) allow a collection of mutually distrusting parties to compute a function of their private inputs without revealing anything else about their inputs to each other. Secure computation was shown to be feasible 35 years ago, but only in the past decade has its efficiency been improved to the point where it has been implemented and, more recently, begun to be used. This real-world deployment of secure computation suggests new applications and raises new questions.</p><p>This talk will survey some recent work at the intersection of the theory and practice of MPC, focusing on a surprising application to the construction of <a href="https://microsoft.github.io/Picnic/" rel="nofollow external" class="bo">Picnic</a>, a “post-quantum” signature scheme currently under consideration by NIST for standardization.</p><p><a href="https://www.cs.umd.edu/~jkatz/" rel="nofollow external" class="bo">Jonathan Katz</a> is a faculty member in the department of computer science at the University of Maryland, College Park, where he formerly served as director of the Maryland Cybersecurity Center for over five years. He is an IACR Fellow, was named a University of Maryland distinguished scholar-teacher in 2017-2018, and received the ACM SIGSAC Outstanding Contribution Award in 2019.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public.</p><p>Upcoming CDL Meetings: Nov. 13, TBA, [possibly: David R Imbordino (NSA), Security of the 2020 presidential election]; Dec. 11, TBA, [possibly: Peter A. H. Peterson (Univ. of Minnesota Duluth), Adversarial Thinking]</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-secure-computation-from-theory-to-practice-12-1pm-oct-30/" rel="nofollow external" class="bo">talk: Secure Computation: From Theory to Practice, 12-1pm Oct 30</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab presents   Secure Computation: From Theory to Practice  Jonathan Katz  Computer Science Department University of Maryland, College Park  12:00–1:00 pm EDT, Friday, 30...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-secure-computation-from-theory-to-practice-12-1pm-oct-30/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96902/guest@my.umbc.edu/d095dd467d54d3508b78e08059ead114/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>quantum-computing</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 24 Oct 2020 13:33:48 -0400</PostedAt>
<EditAt>Sat, 10 Oct 2020 13:33:00 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="88626" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/88626">
<Title>UMBC Cyber Dawgs are named CyberForce national champions</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/11/doe_cyberforce-1024x536.png" alt="" style="max-width: 100%; height: auto;">The Cyber Dawgs at the CyberForce competition. From left, Charles Nicholas, Anna Staats, Drew Barrett, Grant Spencer, Cyrus Bonyadi, and Seamus Burke. Photo courtesy of Argonne National Lab.<br><h2><strong>UMBC Cyber Dawgs are named CyberForce national champions</strong></h2>
    
    
    
    
    
    
    
    <p>UMBC’s Cyber Defense Team, known as the Cyber Dawgs, has emerged the national champion team in the U.S. Department of Energy’s fifth annual CyberForce Competition. The Cyber Dawgs earned first place overall out of more than 100 teams from universities across the country.</p>
    <p>Ten national laboratories hosted competing teams this year, November 15 – 16. UMBC competed at the Argonne National Laboratory near Chicago, Illinois, while other teams traveled to sites like the Pacific Northwest National Laboratory in Washington state and Oak Ridge National Laboratory in Tennessee. Competing teams hailed from a broad range of institutions, including Virginia Tech, Carnegie Mellon, Georgia Tech, Texas A&amp;M and the U.S. Air Force Academy.</p>
    <p>The competition tasks students with defending critical energy infrastructure during simulated cyberattacks. The scenarios are designed to be realistic, focused on water and power systems and including real-world constraints, such as insufficient budget for system upkeep and limited information on system needs. During the competition, “red teams,” including industry professionals, attack the system, while the students work to ensure that the infrastructure is available to their customers, or “green teams,” who test system usability. </p>
    <p>The teams receive points based on how successfully they address attacks, while still allowing users to access the infrastructure they need. The teams are also awarded points for innovative defense tactics and ideas. This year’s competition saw several leading teams with neck-and-neck scores until the final round, when UMBC’s Cyber Dawgs pulled ahead for the victory.</p>
    <p>The competition offers students a unique opportunity to develop their cybersecurity skills in relation to critical infrastructure, and have hands-on experience in a realistic cyberattack situation.</p>
    <p>“The CyberForce competition is the most unique of our annual events, allowing us to experiment with network configurations to defend an industrial control system against adversaries while playing the roles of an IT organization,” explains <strong>RJ Joyce </strong>’18, M.S. ’20, computer science, a member of the winning team. “The hard work, dedication, and creativity that each member brought to the team lifted us from a regional win last year to a national win this year.”</p>
    <p>In addition to Joyce, last weekend’s winning team included <strong>Anna Staats</strong> ’20, computer science; <strong>Drew Barrett</strong> ’20, computer science; <strong>Grant Spencer</strong> ’20, computer science; <strong>Cyrus Bonyadi</strong>, Ph.D. ’23, computer science; and <strong>Seamus Burke</strong> ’20, computer science.</p>
    <p>“The team’s second national championship in three years shows the enthusiasm, grit, and tenacity of our students in demonstrating their technical cyber expertise in a competitive arena,” says <strong>Rick Forno</strong>, senior lecturer of computer science and assistant director of UMBC’s Center for Cybersecurity. </p>
    <p>Forno advises the Cyber Dawgs with <strong>Charles Nicholas</strong>, professor of computer science and electrical engineering. “It’s an awesome thing not just for the team and university,” he says, “but for each competitor individually, as they prepare to enter the cybersecurity workforce after graduation.”</p>
    <p>UMBC students have a strong record in state and national competition. In 2018, UMBC computer science and information systems students <a href="https://news.umbc.edu/umbc-students-win-top-prize-at-maryland-cyber-challenge/" rel="nofollow external" class="bo">won the top prize at the Maryland Cyber Challenge</a>. A year earlier, the UMBC Cyber Dawgs won the <a href="https://news.umbc.edu/umbc-cyber-dawgs-top-2017-national-collegiate-cyber-defense-competition/" rel="nofollow external" class="bo">National Collegiate Cyber Defense Competition</a>.</p>
    
    <p><em>Adapted from a <a href="https://news.umbc.edu/umbc-cyber-dawgs-are-named-cyberforce-national-champions/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/11/umbc-cyber-dawgs-are-named-cyberforce-national-champions/" rel="nofollow external" class="bo">UMBC Cyber Dawgs are named CyberForce national champions</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The Cyber Dawgs at the CyberForce competition. From left, Charles Nicholas, Anna Staats, Drew Barrett, Grant Spencer, Cyrus Bonyadi, and Seamus Burke. Photo courtesy of Argonne National Lab.  UMBC...</Summary>
<Website>https://www.csee.umbc.edu/2019/11/umbc-cyber-dawgs-are-named-cyberforce-national-champions/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/88626/guest@my.umbc.edu/c932c805fd9921bb2a7c6733824198ca/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 19 Nov 2019 15:38:07 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="88544" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/88544">
<Title>UMBC Cyberdawgs win first place in the 2019 DOE CyberForce Competition</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/11/doe_cyberforce-1024x536.png" alt="" style="max-width: 100%; height: auto;">UMBC’s CyberDawgs win first place in the 2019 DOE Cyberforce Competition<h3><strong>Cyberdawgs place first out of 105 teams in DOE’s 5th CyberForce Competition</strong></h3>
    
    
    
    <p>Congratulations to the <a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">UMBC CyberDawgs</a> team for their first place finish in a field of 105 collegiate teams in the U.S. Department of Energy’s Fifth Annual <a href="https://cyberforcecompetition.com/" rel="nofollow external" class="bo">CyberForce Competition</a>. The distributed event was held at ten of the DOE’s National Laboratories and challenged 105 teams to defend a simulated energy infrastructure from cyber-attacks. </p>
    
    
    
    <p>The took place on November 15 and 16  with the goal of  bolstering the U.S. cybersecurity workforce by extending skill-building opportunities for students, offering memorable hands-on experiences and highlighting the crucial role this field plays in preserving national energy security.  The Cyberdawgs participated at the <a href="https://www.anl.gov/" rel="nofollow external" class="bo">Argonne National Laboratory</a> site in Illinois.</p>
    
    
    
    <p>During the competition, teams competed to defend their simulated infrastructure from attacks by adversarial ​“red teams” composed of industry professionals, all while maintaining service for their ​“green team” customers, played by volunteers.  The scenarios included simulated industrial control system components, real-world anomalies and constraints, and interaction with users of the systems. </p>
    
    
    
    <p>Teams were  scored on their success in protecting the infrastructure against attacks while ensuring the usability of the system, with additional points awarded for innovative ideas and defenses.</p>
    
    
    
    <p>The team that competed in this year’s competition was chosen from members of the <a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">CyberDawgs</a> student group, composed of students from a variety of majors who share a common interest in computer and network security.  No prior experience is required to join and any UMBC students who want to learn more about cybersecurity and learn new skills in the field are encouraged to subscribe to its mailing list and attend meetings.</p>
    
    
    
    
    
    
    
    <p>The CyberDawgs group is advised by CSEE faculty <a href="https://www.csee.umbc.edu/people/faculty/charles-nicholas/" rel="nofollow external" class="bo">Charles Nicholas</a> and <a href="https://www.csee.umbc.edu/~rforno/" rel="nofollow external" class="bo">Richard Forno</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/11/umbc-cyberdawgs-win-first-place-2019-doe-cyberforce-competition-argonne-cybersecurity-security/" rel="nofollow external" class="bo">UMBC Cyberdawgs win first place in the 2019 DOE CyberForce Competition</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC’s CyberDawgs win first place in the 2019 DOE Cyberforce Competition Cyberdawgs place first out of 105 teams in DOE’s 5th CyberForce Competition      Congratulations to the UMBC CyberDawgs...</Summary>
<Website>https://www.csee.umbc.edu/2019/11/umbc-cyberdawgs-win-first-place-2019-doe-cyberforce-competition-argonne-cybersecurity-security/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/88544/guest@my.umbc.edu/ee7b8df122690fe7ad2794a05a16674d/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Tag>uncategorized</Tag>
<Tag>undergraduate</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>8</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 17 Nov 2019 17:25:26 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="80129" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80129">
<Title>Richard Forno: Threats remain to US voting system &#8211; and voters&#8217; perceptions of reality</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/file-20181106-74772-egm5dt_slider.jpg" style="max-width: 100%; height: auto;">As Americans go to the polls, the voting process and the information environment are still not secure. <span><a href="http://www.apimages.com/metadata/Index/APTOPIX-Election-2018-Georgia/c0c2653a5cff44eeb562ada74c3d17bc/3/0" rel="nofollow external" class="bo">AP Photo/David Goldman</a></span>
    <h1><strong>Threats remain to US voting system – and voters’ perceptions of reality</strong></h1>
    <p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>As the 2018 midterms proceed, there are still significant risks to the integrity of the voting system – and information warfare continues to try to influence the American public’s choices when they cast their ballots.</p>
    <p>On the day of the election, there were a number of <a href="https://www.propublica.org/article/oops-we-forgot-to-plug-in-the-voting-machine" rel="nofollow external" class="bo">early hitches in voting at individual polling places</a>, such as <a href="https://bklyner.com/sloppy-start-on-election-day/" rel="nofollow external" class="bo">polling places opening late</a> and vote-counting machines not plugged in. But there seem not – at least not yet – to be major <a href="https://www.propublica.org/electionland/" rel="nofollow external" class="bo">problems across the country</a>.</p>
    <p>However, not all the election-related news and information voters have been encountering in recent days and weeks is accurate, and some of it is deliberately misleading. As this election’s results come back, they will reveal whether the misinformation and propaganda campaigns conducted alongside the political ones were effective.</p>
    <h2>Securing election systems</h2>
    <p>America’s electoral process remains highly fragmented, because of the country’s cherished tradition of decentralized government and local control. While this may leave some individual communities’ voting equipment potentially vulnerable to attack, the nation’s voting process overall may be more trustworthy as a result of this fragmentation. With no unified government agency or office to provide, administer and protect election technologies, there’s not one central national element that could fail or be attacked.</p>
    <p>Across the country, though, many districts’ voters will cast ballots with the <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">help of machines</a> that have <a href="https://theconversation.com/americas-aging-voting-machines-managed-to-survive-another-election-68100" rel="nofollow external" class="bo">long-standing</a> <a href="https://theconversation.com/aging-voting-machines-threaten-election-integrity-54523" rel="nofollow external" class="bo">security concerns</a>. Fortunately, <a href="https://www.axios.com/five-states-without-paper-trail-of-votes-32801015-4ba1-4b41-80ca-ebab2cdda087.html" rel="nofollow external" class="bo">45 states</a> keep a paper record of each vote cast – whether for fear of threats to voting integrity or just <a href="https://www.the-parallax.com/2018/11/03/funding-secure-voting/" rel="nofollow external" class="bo">budget constraints preventing purchase</a> of newer gear. But that means <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">five states</a> – Louisiana, Georgia, South Carolina, New Jersey and Delaware – don’t keep paper records of their voters’ choices.</p>
    <p><a href="https://www.politico.com/newsletters/morning-cybersecurity/2018/07/12/voting-machine-vendors-under-pressure-277054" rel="nofollow external" class="bo">Voting machine vendors have been reluctant</a> to appear before Congress to explain their systems’ security practices – <a href="https://www.usatoday.com/story/tech/2017/07/30/hackers-defcon-conference-exploit-vulnerabilities-voting-machines/523639001/" rel="nofollow external" class="bo">and shortcomings</a>. However, <a href="https://fcw.com/articles/2018/10/02/nielsen-election-cyber-dhs.aspx" rel="nofollow external" class="bo">federal agencies have helped some states</a> reduce the likelihood of voting machines being hacked or physically tampered with.</p>
    <h2>Beyond voting machines</h2>
    <p>Election security is about much more than voting machines and vote-counting systems, though they are the most visible technologies at work on Election Day. State systems that track voter registrations, or allow users to register online, are enticing targets for hackers, too. Security firm Carbon Black reported that <a href="https://www.forbes.com/sites/daveywinder/2018/10/30/81-5m-voter-records-for-sale-on-dark-web-ahead-of-midterm-elections/" rel="nofollow external" class="bo">81 million voter records from 20 states</a> are available in online forums. This data, obtained by hacking various official and corporate databases, could be used to facilitate voter fraud or sow confusion at polling places on Election Day: How would you feel if you were told that someone using your name and address had already voted?</p>
    <p>There are security concerns even in states like Oregon, where everyone votes on paper and mails in their ballots in advance of Election Day. That <a href="https://lmtribune.com/northwest/phishing-attempts-on-oregon-election-officials-increase/article_938cbf55-cc7d-532b-8f6c-f27bf0150040.html" rel="nofollow external" class="bo">state’s election officials were targeted by hackers</a> seeking to gain access to <a href="https://arstechnica.com/tech-policy/2018/11/file-sharing-software-on-state-election-servers-could-expose-them-to-intruders/" rel="nofollow external" class="bo">state email and database systems</a>. With that access, attackers might be able to digitally impersonate a government official to send false or confusing emails, press releases or other notifications to citizens, journalists or poll workers.</p>
    <p>Also at risk are public-facing official websites that carry election information. Merely changing the reported location of polling places or voting hours could prevent some people from voting. Also vulnerable are states’ methods of announcing preliminary election results. At a major internet security conference in August, children were able to compromise replicas of several states’ election-reporting systems. The most remarkable was that in just 10 minutes, an <a href="https://www.pbs.org/newshour/nation/an-11-year-old-changed-election-results-on-a-replica-florida-state-website-in-under-10-minutes" rel="nofollow external" class="bo">11-year-old boy cracked the security</a> on a copy of the Florida secretary of state’s website and was able to change the publicly announced vote totals for candidates. That could be enough to cast doubt on whatever was later reported as the official results – and the integrity of the system itself.</p>
    <h2>Managing information on social media</h2>
    <p>A more difficult threat to defend against is <a href="https://theconversation.com/how-the-russian-government-used-disinformation-and-cyber-warfare-in-2016-election-an-ethical-hacker-explains-99989" rel="nofollow external" class="bo">information warfare</a>, which doesn’t attack voting machines or election officials’ computers. Rather, it <a href="https://theconversation.com/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds-100069" rel="nofollow external" class="bo">targets voters’ perceptions and decisions</a>, seeking to influence how they vote.</p>
    <p>Long before the 2016 U.S. presidential election, information warfare was influencing elections around the world, including in <a href="https://www.washingtonpost.com/business/economy/russian-disinformation-on-facebook-targeted-ukraine-well-before-the-2016-us-election/2018/10/28/cc38079a-d8aa-11e8-a10f-b51546b10756_story.html" rel="nofollow external" class="bo">Ukraine</a>, <a href="https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html" rel="nofollow external" class="bo">Myanmar</a> and <a href="https://www.wired.co.uk/article/egypt-fake-news-facebook-oppress-women" rel="nofollow external" class="bo">Egypt</a>. But after 2016, <a href="https://www.theverge.com/2018/11/5/18056610/facebook-mark-warner-congress-cambridge-analytica" rel="nofollow external" class="bo">Facebook and Twitter came under intense scrutiny</a> for their role in providing digital environments that facilitated the spread of misinformation to sow discontent, and special counsel Robert Mueller began <a href="https://theconversation.com/if-the-12-indicted-russians-never-face-trial-in-the-us-can-anything-be-gained-99997" rel="nofollow external" class="bo">investigating Russians’ influence efforts</a>.</p>
    <p>In the run-up to the 2018 midterms, Russians and others were still hard at work trying to influence Americans to vote in ways that help foreign interests. In October, the U.S. Department of Justice charged a Russian woman with <a href="https://thehill.com/policy/national-security/412287-russian-woman-charged-with-interfering-in-midterm-elections" rel="nofollow external" class="bo">creating thousands of fake social media accounts</a> allegedly representing American citizens to “<a href="https://www.justice.gov/opa/pr/russian-national-charged-interfering-us-political-system" rel="nofollow external" class="bo">create and amplify divisive social media and political content</a>” before the election.</p>
    <p>This year, though, unlike two years ago, <a href="https://www.nytimes.com/2018/10/20/us/politics/2018-digital-misinformation-roundup.html" rel="nofollow external" class="bo">social media companies are taking action</a>. Twitter and Facebook have both <a href="https://theconversation.com/why-do-so-many-people-fall-for-fake-profiles-online-102754" rel="nofollow external" class="bo">deleted thousands of accounts</a> <a href="https://theconversation.com/hate-speech-is-still-easy-to-find-on-social-media-106020" rel="nofollow external" class="bo">they identified</a> as engaging in <a href="https://theconversation.com/even-a-few-bots-can-shift-public-opinion-in-big-ways-104377" rel="nofollow external" class="bo">propaganda and influence-peddling</a>. And they have <a href="https://www.theguardian.com/commentisfree/2018/jul/20/facebook-pledge-to-eliminate-false-information-is-itself-fake-news" rel="nofollow external" class="bo">made other efforts</a> to <a href="https://www.wired.com/story/inside-facebooks-plan-to-safeguard-2018-election/" rel="nofollow external" class="bo">identify and fight falsehoods</a> on their platforms, too.</p>
    <p>Nevertheless, online misinformation continues to thrive. <a href="https://www.knightfoundation.org/reports/disinformation-fake-news-and-influence-campaigns-on-twitter" rel="nofollow external" class="bo">More than 80 percent</a> of the Twitter accounts that often shared links to false and misleading information in 2016 are still active today. And the <a href="https://theconversation.com/unlike-in-2016-there-was-no-spike-in-misinformation-this-election-cycle-105946" rel="nofollow external" class="bo">amount of online misinformation</a> is <a href="https://comprop.oii.ox.ac.uk/research/midterms2018/" rel="nofollow external" class="bo">higher than it was</a> two years ago.</p>
    <h2>Investigating alleged wrongdoing</h2>
    <p>U.S. intelligence and police agencies are concerned about the <a href="https://thehill.com/policy/cybersecurity/412863-officials-prepare-for-potential-false-claims-of-election-interference" rel="nofollow external" class="bo">potential effects of misinformation</a> on the American electorate. But large proportions of the country don’t <a href="https://www.newsmax.com/ronpaul/state-deep-trump-mueller/2018/07/16/id/872012/" rel="nofollow external" class="bo">trust those organizations</a> to be <a href="https://arstechnica.com/tech-policy/2018/11/with-no-evidence-georgias-top-voting-official-accuses-dems-of-cyberattack/" rel="nofollow external" class="bo">politically independent</a>. It doesn’t help that the White House continues to <a href="https://www.washingtonpost.com/politics/without-evidence-trump-and-sessions-warn-of-voter-fraud-in-tuesdays-elections/2018/11/05/e9564788-e115-11e8-8f5f-a55347f48762_story.html" rel="nofollow external" class="bo">claim, without evidence</a>, that <a href="https://www.cnn.com/2018/10/22/politics/donald-trump-voter-fraud/index.html" rel="nofollow external" class="bo">voter fraud</a> is a significant problem.</p>
    <p>Mainstream news organizations can find themselves under scrutiny too, either for <a href="https://www.washingtonpost.com/outlook/2018/10/24/russians-didnt-swing-election-trump-fox-news-might-have/" rel="nofollow external" class="bo">reporting falsehoods</a> that <a href="https://www.pbs.org/newshour/arts/after-a-week-of-russian-propaganda-i-was-questioning-everything" rel="nofollow external" class="bo">appear to gain traction online</a> or for failing to <a href="https://www.poynter.org/news/guide-anti-misinformation-actions-around-world" rel="nofollow external" class="bo">filter out or properly identify inaccurate information</a> for their readers.</p>
    <h2>Looking ahead</h2>
    <p>Protecting democracy is a huge challenge. I’ve written before that it involves <a href="https://theconversation.com/this-election-was-not-hacked-but-it-was-attacked-67511" rel="nofollow external" class="bo">more than technical solutions</a> to computer problems. The U.S. government, and the people it serves, must find the desire and the drive to establish secure and trustworthy procedures for running elections across the country. Education is also key, teaching people from an early age how to recognize propaganda and misinformation, and think critically about the information they encounter. Facts are not subject to alternative views; without widespread agreement on common objective realities, society and government cannot function well.</p>
    <p>Technology continues to evolve, presenting challenges to individuals and society alike. Emerging “<a href="https://theconversation.com/detecting-deepfake-videos-in-the-blink-of-an-eye-101072" rel="nofollow external" class="bo">deepfake</a>” technology is already helping <a href="https://www.lawfareblog.com/deep-fakes-looming-crisis-national-security-democracy-and-privacy" rel="nofollow external" class="bo">create convincing videos of people appearing to say</a> and do things they never said or did. In addition, intelligent social media <a href="https://www.theverge.com/2018/10/15/17980026/social-media-bot-human-difference-ai-study" rel="nofollow external" class="bo">bots are becoming more human-like</a>, making identifying and blocking them much more difficult. That’s just some of the challenges that democracies will face in the future.</p>
    <p>Many of these problems will not have a clearly defined fix, because they involve a nuanced balancing of individual rights and social necessities. Real and lasting solutions must come from civil discourse by rational and objectively informed people who have, above all, the actual honest desire to do it right.<a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/threats-remain-to-us-voting-system-and-voters-perceptions-of-reality-105545" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/" rel="nofollow external" class="bo">Richard Forno: Threats remain to US voting system – and voters’ perceptions of reality</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>As Americans go to the polls, the voting process and the information environment are still not secure. AP Photo/David Goldman  Threats remain to US voting system – and voters’ perceptions of...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80129/guest@my.umbc.edu/cfde4542edba58ca31cbea1ce67bb24d/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 15:03:32 -0500</PostedAt>
<EditAt>Tue, 06 Nov 2018 15:03:32 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="78824" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78824">
<Title>Learn cybersecurity skills in NSA&#8217;s Codebreaker Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p> </p>
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/nsa_cbc_2018.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/nsa_cbc_2018-1024x461.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1>Get hands-on cybersecurity and blockchain skills in NSA’s Codebreaker Challenge</h1>
    <p> </p>
    <p>NSA’s sixth annual <a href="https://codebreaker.ltsnet.net/home" rel="nofollow external" class="bo">Codebreaker Challenge</a> is a hands-on, cybersecurity engineering challenge in which students work to complete mission-focused objectives and push their university to the top of the competition leaderboard.</p>
    <p>The 2018 scenario involves ransomware and blockchain. A new strain of ransomware has managed to penetrate several critical government networks and NSA has been called upon to assist in remediating the infection to prevent massive data losses. For each infected machine, an encrypted copy of the key needed to decrypt the ransomed files has been stored in a smart contract on the <a href="http://www.ethdocs.org/en/latest/" rel="nofollow external" class="bo">Ethereum blockchain</a> and is set to only be unlocked upon receipt of the ransom payment. Your mission is to ultimately (1) find a way to unlock the ransomware without giving in to the attacker’s demands and (2) figure out a way to recover all of the funds already paid by other victims. Are YOU up to the challenge?</p>
    <p>UMBC students did well, both individually and as a group, in previous challenges.  Let’s make it to the top of the leaderboard this year.</p>
    <ul><li>The challenge is hosted at <a href="https://codebreaker.Ltsnet.net" rel="nofollow external" class="bo">https://codebreaker.Ltsnet.net</a></li>
    <li>The challenge end on December 31st</li>
    <li>Students register for the challenge at<a href="https://codebreaker.ltsnet.net/home" rel="nofollow external" class="bo">2017 Codebreaker Challenge</a> using their umbc.edu email addresses</li>
    <li>The challenge website has <a href="https://codebreaker.ltsnet.net/resources" rel="nofollow external" class="bo">nine lectures</a> on reverse engineering, so students with little coding or cybersecurity experience can participate</li>
    </ul><p>Feedback from previous iterations of the challenge showed that students were able to learn a great deal from participating. Each student receives a slightly different set of challenge binaries and associated files, so that one student’s solution won’t work for someone else. The binaries are similar enough so that students can work together to understand the problems and develop approaches to solutions and hen implement them independently and register their results.</p>
    <p>The 2018 challenge consists of a series of tasks that are worth a varying amount of points based upon their difficulty. In previous years, tasks had to be solved in order to unlock the next task and rankings were based upon the quantity of solvers that progressed the furthest from each school. This way of ranking heavily weighted progression above participation and did not allow for skipping ahead if a particular task became a stumbling block. So to address these issues, all tasks will be available immediately upon registration and can be solved in any order. The point value associated with each task is based on relative difficulty and schools will be ranked according to total number of points accumulated by their students. It is still recommended to solve tasks in order since the tasks flow with the storyline, but that is no longer a requirement.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/learn-cybersecurity-skills-in-nsas-codebreaker-challenge/" rel="nofollow external" class="bo">Learn cybersecurity skills in NSA’s Codebreaker Challenge</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>           Get hands-on cybersecurity and blockchain skills in NSA’s Codebreaker Challenge       NSA’s sixth annual Codebreaker Challenge is a hands-on, cybersecurity engineering challenge in...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/learn-cybersecurity-skills-in-nsas-codebreaker-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78824/guest@my.umbc.edu/b5c63a73e1d311c9178ad83678684ddf/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 23 Sep 2018 09:45:05 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="75116" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/75116">
<Title>talk: Cybersecurity as a Team Sport &#8211; Understanding Counsel&#8217;s Role, 6pm Wed 4/4</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/03/speaker-series-1024x252.png" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>The <a href="http://shadygrove.umbc.edu/cyber/" rel="nofollow external" class="bo">UMBC at Shady Grove Cybersecurity Program</a> Presents</h4>
    <h1><strong><a href="http://shadygrove.umbc.edu/cyber/speakerseries" rel="nofollow external" class="bo">Cybersecurity as a Team Sport – Understanding Counsel’s Role</a></strong></h1>
    <h2>Allison Bender J.D.</h2>
    <h3><strong>6:00-8:00pm Wednesday, 4 April 2018</strong></h3>
    <p><strong>The Universities at Shady Grove</strong><br><strong> Building III (Camille Kendall Academic Center) Room 4230</strong><br><strong> 9636 Gudelsky Drive, Rockville, Maryland 20850</strong><br><strong> <a href="https://www.shadygrove.umd.edu/about-usg/directions-transportation" rel="nofollow external" class="bo">Directions/Parking</a></strong></p>
    <p>In this presentation by seasoned incident response counsel, Allison Bender, you will gain a risk-informed perspective on the role of counsel in cybersecurity governance and incident response. Also, learn strategies for more effective communication and cooperation with other cybersecurity stakeholders (e.g., IT, IT Security, HR, Communications, business leaders, senior executives and the board); and take away practical tips for prioritizing efforts that help tame the chaos of cybersecurity incident response while maintaining privilege as appropriate.</p>
    <hr><p>Allison Bender counsels Fortune 50 companies and startups in a range of industries on cybersecurity and privacy matters in the U.S. and internationally. Drawing from her roots in government, national security, and R&amp;D, she helps clients navigate legal issues associated with emerging technologies and aids clients in strategically managing legal, financial, and reputational cybersecurity risks. Allison translates technical, operational, legal, and policy issues to create practical solutions for clients’ legal challenges. Her cybersecurity and national security preparedness counseling is informed by over 80 incident response efforts. When drafting corporate policies and considering product design options, Allison’s advice is seasoned in the management of breaches involving personal data, intellectual property, payment card information, export controlled technical data, and other regulated information. Her experience also extends to counseling on cybersecurity and national security due diligence in mergers and acquisitions, vendor management, and transactions. From DHS, Allison brings experience in incident response as well as cybersecurity policy, information sharing, liability, and incentives. She was the primary operational legal counsel for the federal response to the Heartbleed vulnerability, the USIS-KeyPoint data breach, and the Healthcare.gov data breach.</p>
    <p>Hosts: Dr. Behnam Shariati (*protected email*) and the UMBC Graduate Cybersecurity Association at USG</p>
    <p>The UMBC Graduate Cybersecurity Association at USG is an organization created and managed by UMBC Cybersecurity graduate students at Shady Grove. The mission of Cybersecurity Association is to promote the study of Cybersecurity and to raise Cybersecurity awareness and knowledge in the community through panel discussions, conferences, and Cyber competitions. Also, the Cybersecurity Association aspires to create a supportive and positive learning environment in which every member has the opportunity to network, learn, and grow.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/03/talk-cybersecurity-team-sport-understanding-counsels-role/" rel="nofollow external" class="bo">talk: Cybersecurity as a Team Sport – Understanding Counsel’s Role, 6pm Wed 4/4</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC at Shady Grove Cybersecurity Program Presents   Cybersecurity as a Team Sport – Understanding Counsel’s Role   Allison Bender J.D.   6:00-8:00pm Wednesday, 4 April 2018   The Universities...</Summary>
<Website>https://www.csee.umbc.edu/2018/03/talk-cybersecurity-team-sport-understanding-counsels-role/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/75116/guest@my.umbc.edu/2f5b7b7cf26b697d3ec816f5139a17d5/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 27 Mar 2018 22:35:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72617" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72617">
<Title>talk: Bill Fisher (NCCOE) on IoT Security @ USG 10/30 6-8PM</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/iot_slider.jpg" style="max-width: 100%; height: auto;"></p>
    <h3>The UMBC Cybersecurity program at USG Speaker Series Presents</h3>
    <h1>The Internet of Things (IoT)</h1>
    <p>With speaker</p>
    <h3>William (Bill) Fisher, NCCoE Security Engineer</h3>
    <h3>Building III – Room 4230 (<a href="https://www.shadygrove.umd.edu/about-usg/directions-transportation" rel="nofollow external" class="bo">Universities @ Shady Grove Campus)</a></h3>
    <h3>Monday, October 30th 6:00-8:00 pm</h3>
    <p>The Internet of Things (IoT) is the inevitable result of years of Moore’s law – compact, cheap, chip platforms that can take ordinarily house hold items and make them data generating and collection devices that users can manage with their smart phone, web browser or their favorite automation platform. Physical proximity is no longer needed for things like cameras, door locks or thermostats. Instead users remotely access all of these “things” while on the go, even sharing some of their favorite things with friends and family, who need not own the thing, but simply be granted access through a web portal or mobile application. Like many technology trends before it, the IoT has brought great innovation but also great security challenges. These challenges go beyond standards and technology to economic and market forces that hinder security best practices, even for some of the most basic cyber hygiene. Join Bill Fisher of the National Cybersecurity Center of Excellence for a presentation on these challenges and basic mitigations organizations can put into place to help alleviate the risk that the IoT devices pose to consumers and the enterprise.</p>
    <p><strong>Speaker Bio:</strong></p>
    <p>Bill Fisher is a security engineer at the National Cybersecurity Center of Excellence (NCCoE). In this role, he is responsible for leading a team of engineers that work collaboratively with industry partners to address cybersecurity business challenges facing the nation. He leads the center’s Attribute Based Access Control (ABAC) project, Mobile Application Single Sign On (SSO) for the Public Safety and First Responder Sector, and is part of the ITL Cybersecurity for IoT program. Prior to his work at the NCCoE, Mr. Fisher was a program security advisor for the System High Corporation in support of the Network Security Deployment division at the Department of Homeland Security. He holds a bachelor’s degree in business administration from American University and a master’s degree in cybersecurity from Johns Hopkins University.</p>
    <p><strong>Host:</strong> Dr. Behnam Shariati (*protected email*) and UMBC Graduate Cybersecurity Association at USG</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/talk-bill-fisher-nccoe-iot-security-usg-1030-6-8pm/" rel="nofollow external" class="bo">talk: Bill Fisher (NCCOE) on IoT Security @ USG 10/30 6-8PM</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cybersecurity program at USG Speaker Series Presents   The Internet of Things (IoT)   With speaker   William (Bill) Fisher, NCCoE Security Engineer   Building III – Room 4230...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/talk-bill-fisher-nccoe-iot-security-usg-1030-6-8pm/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72617/guest@my.umbc.edu/85d6e62ef63ac2033b32c576bc185d28/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 16 Oct 2017 11:47:51 -0400</PostedAt>
</NewsItem>

</News>
