<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="3" pageSize="10" timestamp="Sun, 19 Apr 2026 17:55:18 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=data-science">
<NewsItem contentIssues="true" id="96415" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96415">
<Title>talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/dc_blockchain_tweet-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h3>UMBC Data Science Meetup Talk</h3><h1><strong>Exploding Blockchain Myths</strong></h1><h3><strong>Maria Vachino and Dr. James P. Howard</strong></h3><h3>5:30-7:00pm Tuesday, 13 October 2020</h3><hr><p>In this talk, Maria Vachino from Easy Dynamics and Dr. James P. Howard from APL will provide an overview of what blockchain is and isn’t, focusing on non-cryptocurrency use cases, will explain the results of their research for the DHS S&amp;T Cybersecurity Directorate, and will provide insight into the value (or lack therefore) of the technology. </p><p>References:<br>  • <a href="https://ieeexplore.ieee.org/document/8965252/" rel="nofollow external" class="bo">https://ieeexplore.ieee.org/document/8965252/</a><br>  • <a href="http://jitm.ubalt.edu/XXX-3/article3.pdf" rel="nofollow external" class="bo">http://jitm.ubalt.edu/XXX-3/article3.pdf</a></p><p><a href="https://www.linkedin.com/in/mariavachino/" rel="nofollow external" class="bo">Maria Vachino</a> is the Director of Digital Identity at <a href="https://www.easydynamics.com/" rel="nofollow external" class="bo">Easy Dynamics</a> where she is focused on Identity Credential &amp; Access Management (ICAM) technologies, policies, &amp; standards, Cybersecurity, and IT modernization for the US Federal Government. She started investigating applications for blockchain technology in 2015 as the Technical and Government Engagement Lead for the DHS S&amp;T Cyber Security Directorate’s Identity Management Research &amp; Development Program while a member of the Senior Professional Staff at the Johns Hopkins Applied Physics Lab. Maria has a BS in Computer Science from UMBC and an MS in Cybersecurity.</p><p>Dr. <a href="https://www.linkedin.com/in/k3jph/" rel="nofollow external" class="bo">James P. Howard, II</a> (UMBC Ph.D. ’14) is a scientist at the <a href="https://www.jhuapl.edu/" rel="nofollow external" class="bo">Johns Hopkins Applied Physics Laboratory</a>. Previously, he was a consultant to numerous government agencies, including the Securities and Exchange Commission, the Executive Office of the President, and the United States Department of Homeland Security, and worked for the Board of Governors of the Federal Reserve System as an internal consultant on scientific computing. He is a passionate educator, teaching mathematics and statistics at the University of Maryland Global Campus since 2010 and has taught public management at Central Michigan University, Penn State, and the University of Baltimore. His most recent work has modeled the spread of infectious respiratory diseases and Ebolavirus, predicted global disruptive events, researched using blockchain for government services, and created devices for rescuing victims of building collapse. He is the author of two books.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/" rel="nofollow external" class="bo">talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Data Science Meetup Talk  Exploding Blockchain Myths  Maria Vachino and Dr. James P. Howard  5:30-7:00pm Tuesday, 13 October 2020   In this talk, Maria Vachino from Easy Dynamics and Dr....</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96415/guest@my.umbc.edu/097b844dc5ba2983199d05604cc47309/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 06 Oct 2020 20:58:09 -0400</PostedAt>
<EditAt>Tue, 06 Oct 2020 20:58:09 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="91356" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/91356">
<Title>Webex talk: John Mitchell: Will Blockchain Change Everything? Fri 3/27 1-2pm</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2020/03/jm-1.png" alt="" style="max-width: 100%; height: auto;"><h4><strong>Lockheed Martin Distinguished Speaker Series</strong></h4>
    
    
    
    <h1><strong>Will Blockchain Change Everything?</strong></h1>
    
    
    
    <h3>Dr. John Mitchell<br> Mary and Gordon Crary Family Professor <br> Departments of Computer Science &amp; Electrical Engineering <br> Stanford University</h3>
    
    
    
    <h4><strong>1:00-2:00pm EST, Friday, 27 March 2020<br> Webex meeting hosted by Anupam Joshi<br><a href="https://umbc.webex.com/meet/joshi" rel="nofollow external" class="bo">https://umbc.webex.com/meet/joshi</a></strong></h4>
    
    
    
    <p>Far from serving only as a foundation for cryptocurrency, blockchain technology provides a general framework for trusted distributed ledgers. Over the past few years, their popularity has grown tremendously, as shown by the number of companies and efforts associated with the Linux Foundation’s Hyperledger project, for example. From a technical standpoint, a blockchain combines a storage layer, networking protocols, a consensus layer, and a programmable transaction layer, leveraging cryptographic operations. The distributed state machine paradigm provides atomicity and transaction rollback, while consensus supports distributed availability as well as certain forms of fair access. From an applications perspective, blockchains appeal to distributed networks of independent agents, as arise in supply chain, credentialing, and decentralized financial services. The talk will look at the potential for radical change as well as specific technical challenges associated with verifiable consensus protocols and trustworthy smart contracts.</p>
    
    
    
    <p><a href="https://theory.stanford.edu/~jcm/" rel="nofollow external" class="bo">John Mitchell</a> is the Mary and Gordon Crary Family Professor in the School of Engineering, Professor of Computer Science, co-director of the Stanford Computer Security Lab, and Professor (by courtesy) of Education. He was Vice Provost at Stanford University from 2012 to 2018. Mitchell’s research focusses on programming languages, computer, and network security, privacy, and education. He has published over 200 research papers, served as editor of eleven journals, including Editor-in-Chief of the Journal of Computer Security, and written two books. He has led research projects funded by numerous organizations and served as advisor and consultant to successful small and large companies. His first research project in online learning started in 2009 when he and six undergraduate students built Stanford CourseWare, an innovative platform that served as the foundation for initial flipped classroom experiments at Stanford and helped inspire the first massive open online courses (MOOCs) from Stanford. Professor Mitchell currently serves as Chair of the Stanford Department of Computer Science.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/03/webex-talk-john-mitchell-will-blockchain-change-everything-fri-3-27-1-2pm/" rel="nofollow external" class="bo">Webex talk: John Mitchell: Will Blockchain Change Everything? Fri 3/27 1-2pm</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Lockheed Martin Distinguished Speaker Series      Will Blockchain Change Everything?      Dr. John Mitchell  Mary and Gordon Crary Family Professor   Departments of Computer Science &amp;...</Summary>
<Website>https://www.csee.umbc.edu/2020/03/webex-talk-john-mitchell-will-blockchain-change-everything-fri-3-27-1-2pm/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/91356/guest@my.umbc.edu/98a6a027f52a1e7e10d749e5648e138a/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 15 Mar 2020 17:27:52 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="90162" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/90162">
<Title></Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2020/01/Blanton.png" alt="" style="max-width: 100%; height: auto;"><h3>Lockheed Martin Distinguished Speaker Series</h3>
    
    
    
    <h1><strong>Designing Secure Hardware Systems</strong></h1>
    
    
    
    <h1><strong>Shawn Blanton</strong></h1>
    
    
    
    <h2>Trustee Professor, Electrical and Computer Engineering<br>Carnegie Mellon University</h2>
    
    
    
    <h2>1:00-2:00pm Friday 7 Feb. 2020</h2>
    
    
    
    <h2>Commons 329, UMBC <br><s>University Center Ballroom</s></h2>
    
    
    
    <p>On October 29, 2018, DARPA issued an RFI that stated: “This Request for Information (RFI) from the Defense Advanced Research Projects Agency’s (DARPA) Microsystems Technology Office (MTO) seeks information on technology, concepts, and approaches to support the integration of security capabilities directly into System on Chip (SoC) system design and to enable the autonomous integration and assembly of SoCs.</p>
    
    
    
    <p>This RFI and the tens of millions of dollars that the US government has already invested in hardware security research and development is based on the fact that the fabrication of state-of-the-art electronics is now mostly overseas. With the recent announcement that GLOBALFOUNDRIES is going to stop all 7nm development, there is now only one company in the US that continues to pursue advanced semiconductors (Intel). Unfortunately, Intel does not have the same experience of making chips for third parties as does Samsung and (most importantly) TSMC (Taiwan Semiconductor Manufacturing Corporation). As a result, the US government believes it will be forced to fabricate advanced, sensitive electronics overseas in untrusted fabrication facilities. As a result, there is keen interest in design methodologies that mitigate reverse engineering, tampering, counterfeiting, etc.</p>
    
    
    
    <p>In this talk, an overview of hardware security will be presented followed by a discussion on a concept called logic locking. This approach will be described and the “back and forth” that is now occurring in the research community involving: (i) vulnerability discovery and (ii) logic locking improvement.</p>
    
    
    
    <p><a href="https://engineering.cmu.edu/directory/bios/blanton-shawn.html" rel="nofollow external" class="bo">Shawn Blanton</a> is a professor in the Electrical and Computer Engineering Department at Carnegie Mellon University and Associate Director of the SYSU-CMU Joint Institute of Engineering (JIE). In 1995 he received his Ph.D. in Electrical Engineering and Computer Science from the University of Michigan, Ann Arbor. His research interests include various aspects of integrated system tests, testable design, and test methodology development. He has consulted for various companies and is the founder of TestWorks, a Carnegie Mellon University spinout focused on information extraction from IC test data. He is a Fellow of the IEEE and Senior Member of the ACM and served as the program chair for the 2011 International Test Conference.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/02/talk-shawn-blanton-cmu-on-designing-secure-hardware-systems-1pm-fri-2-7/" rel="nofollow external" class="bo">🔴 talk: Shawn Blanton (CMU); Designing Secure Hardware Systems, 1pm Fri 2/7; Commons 329</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Lockheed Martin Distinguished Speaker Series      Designing Secure Hardware Systems      Shawn Blanton      Trustee Professor, Electrical and Computer Engineering Carnegie Mellon University...</Summary>
<Website>https://www.csee.umbc.edu/2020/02/talk-shawn-blanton-cmu-on-designing-secure-hardware-systems-1pm-fri-2-7/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/90162/guest@my.umbc.edu/8136f036ce8ed4c55bc786ea98ddc9df/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 05 Feb 2020 09:56:00 -0500</PostedAt>
<EditAt>Wed, 05 Feb 2020 09:56:00 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="89804" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/89804">
<Title>JHU/APL CIRCUIT internship program information session, 3pm Fri 1/31</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2020/01/jhuapl_internships-1024x536.png" alt="" style="max-width: 100%; height: auto;"><h2>JHU/APL CIRCUIT internship program information session</h2>
    
    
    
    <h3>3:00-4:00 pm Friday, 31 January 2020</h3>
    
    
    
    <h3>ITE 459, UMBC</h3>
    
    
    
    <p>There will be a special information session on the JHU/APL CIRCUIT internship program from 3:00 pm to 4:30 pm on Friday, 31 January 2020 in room ITE 459.</p>
    
    
    
    <p>This session is for undergraduates who want to spend their summer (June through August) getting paid to do mentored research at the<a href="https://www.jhuapl.edu/" rel="nofollow external" class="bo"> Johns Hopkins University Applied Physics Lab</a>.  The research areas include AI, data science, cybersecurity, precision medicine, and planetary exploration.</p>
    
    
    
    <p>Interns selected for the program will do mission-oriented research on-site at JHU/APL in Laurel MD mentored by STEM professionals.  There will also be year-round opportunities for engagement and enrichment. The selection for an internship will be based on a combination of potential, need and commitment.</p>
    
    
    
    <p>Email *protected email* or *protected email* with questions.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/01/jhu-apl-circuit-internship-program-information-session-3pm-fri-1-31/" rel="nofollow external" class="bo">JHU/APL CIRCUIT internship program information session, 3pm Fri 1/31</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>JHU/APL CIRCUIT internship program information session      3:00-4:00 pm Friday, 31 January 2020      ITE 459, UMBC      There will be a special information session on the JHU/APL CIRCUIT...</Summary>
<Website>https://www.csee.umbc.edu/2020/01/jhu-apl-circuit-internship-program-information-session-3pm-fri-1-31/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/89804/guest@my.umbc.edu/78328c3f0e19647545384211b4aa76f6/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>machine-learning</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Tag>uncategorized</Tag>
<Tag>undergraduate</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 22 Jan 2020 16:05:36 -0500</PostedAt>
<EditAt>Wed, 01 Jan 2020 16:05:36 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="86106" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/86106">
<Title>talk: Security for Smart Cyber-Physical Systems, 12-1 5/3, ITE 227</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/05/cps.png" alt="" style="max-width: 100%; height: auto;"><h4>UMBC Cyber Defense Lab</h4>
    
    <h1>Security for Smart Cyber-Physical Systems</h1>
    
    <h3> Prof. Anupam Joshi, UMBC</h3>
    <h3>12:00–1:00pm, Friday, 3 May 2019, ITE 227</h3>
    
    
    
    <p>Smart <a href="https://en.wikipedia.org/wiki/Cyber-physical_system" rel="nofollow external" class="bo">Cyber-Physical Systems</a> (CPS) are increasingly embedded in our everyday life. Security incidents involving them are often high-profile because of their ability to control critical infrastructure. Stuxnet and the Ukrainian power-grid attack are some notorious attacks reported against CPS which impacted governmental programs to ordinary users. In addition to the deliberate attacks, device malfunction and human error can also result in incidents with grave consequences. Hence the detection and mitigation of abnormal behaviors resulting from security incidents is imperative for the trustworthiness and broader acceptance of smart cyber-physical systems. We propose an automatic behavioral abstraction technique, ABATe, which automatically learns their typical behavior by finding the latent “context” space using available operational data and is used to discern anomalies. We evaluate our technique using two real-world datasets (a sewage water treatment plant dataset and an automotive dataset) to demonstrate the multi-domain adaptability and efficacy of our approach.</p>
    
    
    
    <p>Anupam Joshi is the Oros Family Professor and Chair of Computer Science and Electrical Engineering Department at the University of Maryland, Baltimore County(UMBC). He is the Director of UMBC’s Center for Cybersecurity, and one of the USM leads for the National Cybersecurity FFRDC. He is a Fellow of IEEE. Dr. Joshi obtained a B.Tech degree from IIT Delhi in 1989, and a Masters and Ph.D. from Purdue University in 1991 and 1993 respectively. His research interests are in the broad area of networked computing and intelligent systems. His primary focus has been on data management and security/privacy in mobile/pervasive computing environments, and policy driven approaches to security and privacy. He is also interested in Semantic Web and Data/Text/Web Analytics, especially their applications to (cyber) security. He has published over 250 technical papers with an h-index of 79 and over 23,250 citations (per Google scholar), filed and been granted several patents, and has obtained research support from National Science Foundation (NSF), NASA, Defense Advanced Research Projects Agency (DARPA), US Dept of Defense (DoD), NIST, IBM, Microsoft, Qualcom, Northrop Grumman, and Lockheed Martin amongst others</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/05/umbc-talk-cybersecurity-smart-cyber-physical-systems-cps/" rel="nofollow external" class="bo">talk: Security for Smart Cyber-Physical Systems, 12-1 5/3, ITE 227</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab    Security for Smart Cyber-Physical Systems     Prof. Anupam Joshi, UMBC   12:00–1:00pm, Friday, 3 May 2019, ITE 227      Smart Cyber-Physical Systems (CPS) are...</Summary>
<Website>https://www.csee.umbc.edu/2019/05/umbc-talk-cybersecurity-smart-cyber-physical-systems-cps/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/86106/guest@my.umbc.edu/2e4bbb97c805f4fd3d6ecbc7c7020288/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 01 May 2019 23:29:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="81612" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81612">
<Title>talk: Using Deep Learning in Identifying Network Intrusions, 10:30am Mon 2/11, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/01/machine_room-1024x536.png" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1>Using Deep Learning in Identifying Network Intrusions</h1>
    <h3>Dr. Rajeev Agrawal<br>
    Information Technology Laboratory<br>
    US Army Engineer Research and Development Center</h3>
    <h3>10:30-11:30 Monday, February 11, 2019, ITE325</h3>
    <p>Deep Learning algorithms have been very successful in computer vision, natural language processing, and speech recognition. However, there is a big challenge in applying it in cyber security domain due to non‐availability of ‘real’ cybersecurity data. Many researchers have tried using synthetic data such as KDD‐NSL or newer UNSW-NB15 network intrusion datasets, however, it is difficult to determine the performance of the proposed research on a dataset captured from an enterprise network. The DoD’s High Performance Computing Modernization Program (HPCMP) operates Defense Research Engineering network (DREN), which has multiple security software and hardware tools installed across the network. A variety of cybersecurity logs are captured using these tools. We use a TensorFlow based framework to analyze DREN’s Bro alert data generated under Cybersecurity Environment for Detection, Analysis and Reporting (CEDAR) project. These alerts are marked as bad or normal by the cybersecurity analysts and used as ground truths. This labeled data is used to measure the performance of our approach in identifying network intrusions. We are able to achieve high level accuracy by tuning hyper-parameters used in any deep learning approach. In this presentation, we will discuss the results of our approach which harnesses the power of HPC systems to train our proposed model.</p>
    <p><a href="https://www.linkedin.com/in/ragrawal2/" rel="nofollow external" class="bo"><strong>Dr. Rajeev Agrawal</strong></a> joined Cyber Engineering and Analysis branch (CEAB), Information Technology Laboratory in 2016. He is the Data Science lead of the High Performance Computing Architecture (HPC) for Cyber Situational Awareness (HACSAW) Project. The goal of this project is to analyze the cybersecurity data captured across Defense Research and Engineering Network (DREN). He is also a member of the HPC-based deep learning project team and exploring deep learning applicability in cybersecurity domain. Dr. Agrawal received his Ph.D. in Computer Science with minor in Engineering from Wayne State University in 2009. Prior to joining ITL, he was an Associate Professor in the Department of Computer Systems Technology at North Carolina A&amp;T State University.  Dr. Agrawal’s research interests include Deep Learning, Cyber Security, SCADA/ICS, Machine Learning and Pattern Recognition. He has published more than 80 technical papers and book chapters in refereed conferences and journals in these areas. He was selected a Data Science Fellow by the National Consortium of Data Science (NCDS) in 2014. His research has been funded by NSF, US Army, John Deere, ACM, RedHat, National Consortium of Data Science and Michigan State University.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/01/talk-using-deep-learning-in-identifying-network-intrusions-1030am-mon-2-11-umbc/" rel="nofollow external" class="bo">talk: Using Deep Learning in Identifying Network Intrusions, 10:30am Mon 2/11, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Using Deep Learning in Identifying Network Intrusions   Dr. Rajeev Agrawal  Information Technology Laboratory  US Army Engineer Research and Development Center   10:30-11:30 Monday, February...</Summary>
<Website>https://www.csee.umbc.edu/2019/01/talk-using-deep-learning-in-identifying-network-intrusions-1030am-mon-2-11-umbc/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81612/guest@my.umbc.edu/e67516e735d4bb31c91bfecf68c17168/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 24 Jan 2019 15:58:15 -0500</PostedAt>
<EditAt>Thu, 24 Jan 2019 15:58:15 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81499" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81499">
<Title>Maryland Data Science Conference, Fri. 1/25, UMBC (new date)</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <a href="https://www.csee.umbc.edu/wp-content/uploads/2019/01/mddsc-1.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/01/mddsc-1-1024x536.png" style="max-width: 100%; height: auto;"></a></p>
    <h1>MD Data Science Conference<br>
    <span>Friday, 25 January, PAH Concert Hall, UMBC</span></h1>
    <p><a href="https://minerkasch.com/" rel="nofollow external" class="bo">Miner &amp; Kasch</a>, a AI and data science consulting firm founded by two UMBC alumni, will hold a one-day <a href="https://conf.minerkasch.com/" rel="nofollow external" class="bo">Data Science Conference</a> at UMBC on Friday, January 25 in the <a href="https://artscalendar.umbc.edu/about/umbc-concert-hall/" rel="nofollow external" class="bo">Linehan Concert Hall</a> of the UMBC Performing Arts &amp; Humanities Building. A limited number of <strong>free tickets</strong> are available for current UMBC students. To attend, you need to <a href="https://www.eventbrite.com/e/maryland-data-science-conference-12519-tickets-54996061701" rel="nofollow external" class="bo">register here</a>.</p>
    <p>The event was originally scheduled for January 14, but had to be rescheduled due to inclement weather. If you had registered and obtained a ticket earlier, you will need to <a href="https://www.eventbrite.com/e/maryland-data-science-conference-12519-tickets-54996061701" rel="nofollow external" class="bo">re-register</a>.</p>
    <p>The event brings together local companies and professionals to share what new and exciting things they are doing with their data. It will be attended by business managers, startup founders, software engineers, data scientists, students, and other curious people that want to learn more about the cutting edge of data science, machine learning, and AI. See the <a href="https://conf.minerkasch.com/" rel="nofollow external" class="bo">conference website</a> for topics and speakers.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/01/maryland-data-science-conference-fri-1-25-umbc-new-date/" rel="nofollow external" class="bo">Maryland Data Science Conference, Fri. 1/25, UMBC (new date)</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>MD Data Science Conference  Friday, 25 January, PAH Concert Hall, UMBC   Miner &amp; Kasch, a AI and data science consulting firm founded by two UMBC alumni, will hold a one-day Data Science...</Summary>
<Website>https://www.csee.umbc.edu/2019/01/maryland-data-science-conference-fri-1-25-umbc-new-date/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81499/guest@my.umbc.edu/a7c10e8671c1c437df7c93a02b6663ae/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 18 Jan 2019 10:24:02 -0500</PostedAt>
<EditAt>Fri, 18 Jan 2019 10:24:02 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81375" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81375">
<Title>Countering Russian disinformation the Baltic nations&#8217; way</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/01/tv-1024x486.png" alt="" style="max-width: 100%; height: auto;">
    <p> </p>
    <h1>Countering Russian disinformation the Baltic nations’ way</h1>
    <h2><a href="https://theconversation.com/profiles/terry-thompson-660173" rel="nofollow external" class="bo">Terry Thompson</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></h2>
    <p>As the new Congress begins, it will soon discuss the <a href="https://comprop.oii.ox.ac.uk/research/ira-political-polarization/" rel="nofollow external" class="bo">comprehensive reports</a> to the U.S. Senate on the <a href="https://www.newknowledge.com/disinforeport" rel="nofollow external" class="bo">disinformation campaign</a> of half-truths, outright fabrications and misleading posts made by agents of the Russian government on social media in the run-up to the 2016 presidential election.</p>
    <p>After years of <a href="https://www.nytimes.com/2018/07/04/opinion/cyber-war-russia-china.html" rel="nofollow external" class="bo">anemic responses to Russian influence efforts</a>, official U.S. government policy now includes taking action to combat disinformation campaigns sponsored by Russia or other countries. In May 2018, the <a href="https://www.intelligence.senate.gov/publications/russia-inquiry" rel="nofollow external" class="bo">Senate Intelligence Committee endorsed</a> the concept of treating attacks on the nation’s election infrastructure as hostile acts to which the U.S. “will respond accordingly.” In June, the <a href="https://www.nytimes.com/2018/06/17/us/politics/cyber-command-trump.html" rel="nofollow external" class="bo">Pentagon unleashed U.S. Cyber Command</a> to respond to cyberattacks more aggressively, and the <a href="https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf" rel="nofollow external" class="bo">National Cyber Strategy</a> published in September 2018 clarified that “all instruments of national power are available to prevent, respond to, and deter malicious cyber activity against the United States.”</p>
    <p>There are already indications that <a href="https://www.nytimes.com/2018/10/23/us/politics/russian-hacking-usa-cyber-command.html" rel="nofollow external" class="bo">Cyber Command conducted operations</a> against Russian disinformation on social media, including warning specific Russians not to interfere with the 2018 elections. However, low-level cyberwarfare is not necessarily the best way. European countries, especially the Baltic states of Estonia, Latvia and Lithuania, have confronted Russian disinformation campaigns for decades. <a href="https://www.npr.org/2018/03/10/592566026/baltic-countries-on-countering-russian-disinformation" rel="nofollow external" class="bo">Their experience</a> may offer useful lessons as the U.S. joins the battle.</p>
    <div>
    <a href="https://images.theconversation.com/files/252765/original/file-20190107-32145-1iuqxhk.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip" rel="nofollow external" class="bo"><img src="https://images.theconversation.com/files/252765/original/file-20190107-32145-1iuqxhk.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip" alt="" style="max-width: 100%; height: auto;"></a><span>The Baltic Sea region of northern Europe. Estonia, Latvia and Lithuania are in light green in the center, west of Russia in blue. </span><span><a href="https://commons.wikimedia.org/wiki/File:Baltic_Sea.png" rel="nofollow external" class="bo">Stefan Ertmann/ Wikimedia Commons</a>, <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="nofollow external" class="bo">CC BY-SA</a></span>
    </div>
    <h2>The Baltic experience</h2>
    <p>Beginning in 1940 and continuing until they declared independence in the early 1990s, the Baltic countries were subjected to systematic <a href="https://www.stratcomcoe.org/gatis-krumins-soviet-economic-gaslighting-latvia-and-baltic-states" rel="nofollow external" class="bo">Russian gaslighting</a> designed to make people doubt their national history, culture and economic development.</p>
    <p>The Soviets rewrote history books to falsely emphasize Russian protection of the Baltic people from invading hordes in the Middle Ages, and to convey the impression that the cultural evolution of the three countries was enabled by their allegiance and close ties to Russia. Even their <a href="https://www.stratcomcoe.org/gatis-krumins-soviet-economic-gaslighting-latvia-and-baltic-states" rel="nofollow external" class="bo">national anthems were rewritten</a> to pay homage to Soviet influence.</p>
    <p>Soviet leaders devalued Baltic currencies and manipulated economic data to <a href="https://www.stratcomcoe.org/gatis-krumins-soviet-economic-gaslighting-latvia-and-baltic-states" rel="nofollow external" class="bo">falsely suggest that Soviet occupation</a> was boosting the Baltic economies. Further, Soviet authorities settled ethnic Russians in the Baltic countries, and <a href="https://www.worldcat.org/title/ideology-and-policy-the-political-uses-of-doctrine-in-the-soviet-union/oclc/16951330" rel="nofollow external" class="bo">made Russian the primary language</a> used in schools.</p>
    <p>Since the fall of the Soviet Union and the independence of the Baltic countries, the Russian Federation has continued to deliver disinformation to the region, making extensive use of <a href="https://www.stratcomcoe.org/virtual-russian-world-baltics" rel="nofollow external" class="bo">Russian-language social media</a>. Some themes characterize the Baltic people as ungrateful for Soviet investment and aid after World War II. Another common message <a href="https://www.stratcomcoe.org/gatis-krumins-soviet-economic-gaslighting-latvia-and-baltic-states" rel="nofollow external" class="bo">criticizes Baltic historians</a> for “falsification of history” when really they are describing the real nature of the Soviet occupation.</p>
    <h2>A massive Russian attack</h2>
    <p>After independence, and as the internet grew, Estonia led the way in <a href="https://www.economist.com/the-economist-explains/2013/07/30/how-did-estonia-become-a-leader-in-technology" rel="nofollow external" class="bo">applying technology to accelerate economic development</a>. The country created systems for a wide range of government and commercial services, including voting, banking and filing tax returns electronically. Today, Estonia’s innovative <a href="https://www.economist.com/europe/2017/07/06/estonia-is-trying-to-convert-the-eu-to-its-digital-creed" rel="nofollow external" class="bo">e-residency system</a> is being adopted in many other countries.</p>
    <p>These advances made the Baltics a prime target for cyberattacks. In the spring of 2007, the Russians struck. When Estonia <a href="http://www.spiegel.de/international/europe/deadly-riots-in-tallinn-soviet-memorial-causes-rift-between-estonia-and-russia-a-479809.html" rel="nofollow external" class="bo">moved a monument memorializing Soviet soldiers</a> from downtown Tallinn, the country’s capital, to a military cemetery a couple of miles away, it provoked the ire of ethnic Russians living in Estonia as well as the Russian government.</p>
    <a href="https://images.theconversation.com/files/252754/original/file-20190107-32139-gz1jgy.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip" rel="nofollow external" class="bo"><img src="https://images.theconversation.com/files/252754/original/file-20190107-32139-gz1jgy.jpg" style="max-width: 100%; height: auto;"></a><span>The relocation of the Bronze Soldier of Tallinn sparked a Russian cyberattack on Estonia in 2007.</span><br>
    <span><a href="https://www.flickr.com/photos/99437479@N00/680737463" rel="nofollow external" class="bo">Keith Ruffles/Wikimedia Commons</a>, <a href="http://creativecommons.org/licenses/by/4.0/" rel="nofollow external" class="bo">CC BY</a></span>
    <p>For three weeks, Estonian government, financial and media computer systems were <a href="https://www.wired.com/2007/08/ff-estonia/" rel="nofollow external" class="bo">bombarded with enormous amounts of internet traffic</a> in a “distributed denial of service” attack. In these situations, an attacker sends overwhelming amounts of data to the targeted internet servers, clogging them up with traffic and either slowing them down or knocking them offline entirely. Despite concerns about the first “cyber war,” however, these attacks resulted in <a href="https://www.cfr.org/book/hacked-world-order" rel="nofollow external" class="bo">little damage</a>. Although Estonia was cut off from the global internet temporarily, the country’s economy suffered no lasting harm.</p>
    <p>These attacks could have severely damaged the country’s financial system or power grid. But <a href="https://ccdcoe.org/sites/default/files/multimedia/pdf/CDU_Analysis.pdf" rel="nofollow external" class="bo">Estonia was prepared</a>. The country’s history with Russian disinformation had led Estonia to expect Russian attacks on computer and information systems. In anticipation, the government spearheaded partnerships with banks, internet service providers and other organizations to coordinate responses to cyberattacks. In 2006, Estonia was one of the first countries to create a <a href="https://www.ria.ee/en/cyber-security/cert-ee.html" rel="nofollow external" class="bo">Computer Emergency Response Team</a> to manage security incidents.</p>
    <h2>The Baltic response</h2>
    <p>After the 2007 attack, the Baltic countries <a href="https://warontherocks.com/2018/01/estonias-approach-cyber-defense-feasible-united-states/" rel="nofollow external" class="bo">upped their game even more</a>. For example, Estonia created the Cyber Defense League, an army of volunteer specialists in information technology. These <a href="https://ccdcoe.org/sites/default/files/multimedia/pdf/CDU_Analysis.pdf" rel="nofollow external" class="bo">experts focus on</a> sharing threat information, preparing society for responding to cyber incidents and participating in international cyber defense activities.</p>
    <p>Internationally, Estonia gained approval in 2008 to establish NATO’s <a href="https://ccdcoe.org/history.html" rel="nofollow external" class="bo">Cooperative Cyber Defense Center of Excellence</a> in Tallinn. Its comprehensive research into global cyber activities helps identify best practices in cyber defense and training for NATO members.</p>
    <p>In 2014, Riga, the capital of neighboring Latvia, became home to another NATO organization combating Russian influence, the <a href="https://www.stratcomcoe.org/" rel="nofollow external" class="bo">Strategic Communications Center of Excellence</a>. It publishes reports on Russian disinformation activities, such as the May 2018 study of the “<a href="https://www.stratcomcoe.org/virtual-russian-world-baltics" rel="nofollow external" class="bo">Virtual Russian World in the Baltics</a>.” That report analyzes Russian social media activities targeting Baltic nations with a “toxic mix of disinformation and propaganda.” It also provides insight into identifying and detecting Russian disinformation campaigns.</p>
    <p>“<a href="https://www.dw.com/en/baltics-battle-russia-in-online-disinformation-war/a-40828834" rel="nofollow external" class="bo">Baltic elves</a>” – volunteers who monitor the internet for Russian disinformation – became active in 2015 after the <a href="https://www.dw.com/en/poroshenko-calls-maidan-a-victorious-battle-in-war-for-independence/a-18271774" rel="nofollow external" class="bo">Maidan Square events</a> in the Ukraine. And the Baltic nations have <a href="https://www.fpri.org/article/2017/07/fighting-disinformation-baltic-states/" rel="nofollow external" class="bo">fined or suspended media channels</a> that display bias.</p>
    <p>The Baltic countries also rely on a European Union agency formed in 2015 <a href="https://eeas.europa.eu/headquarters/headquarters-Homepage/2116/questions-and-answers-about-east-stratcom-task-force_en" rel="nofollow external" class="bo">to combat Russian disinformation campaigns</a> directed against the EU. The agency identifies disinformation efforts and publicizes accurate information that the Russians are seeking to undermine. A new effort will <a href="https://www.baltictimes.com/estonia_welcomes_eu_action_plan_for_tackling_disinformation/" rel="nofollow external" class="bo">issue rapid alerts to the public</a> when potential disinformation is directed against the 2019 European Parliament elections.</p>
    <h2>Will the ‘Baltic model’ work in the US?</h2>
    <p>Because of their political acknowledgment of threats and actions taken by their governments to fight disinformation, a 2018 study rated Estonia, Latvia and Lithuania the three European Union members <a href="https://www.europeanvalues.net/vyzkum/prague-manual/" rel="nofollow external" class="bo">best at responding to Russian disinformation</a>.</p>
    <div class="embed-container"><iframe src="https://www.youtube.com/embed/xSIkkza9TVI?wmode=transparent&amp;start=0" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div><span>A look inside Russia’s propaganda machine.</span>
    <p>Some former U.S. officials have suggested <a href="https://www.washingtonpost.com/opinions/four-steps-to-fight-foreign-interference-in-us-elections/2018/02/14/fb99b7a0-11c1-11e8-8ea1-c1d91fcec3fe_story.html" rel="nofollow external" class="bo">adopting similar practices</a>, including publicizing disinformation efforts and evidence tying them to Russia. The <a href="https://www.intelligence.senate.gov/publications/russia-inquiry" rel="nofollow external" class="bo">Senate Intelligence Committee</a> has called for that too, as has <a href="https://www.atlanticcouncil.org/publications/reports/the-kremlins-trojan-horses-3-0" rel="nofollow external" class="bo">the Atlantic Council, an independent think tank</a> that focuses on international affairs.</p>
    <p>The U.S. could also mobilize volunteers to <a href="https://warontherocks.com/2018/01/estonias-approach-cyber-defense-feasible-united-states/" rel="nofollow external" class="bo">boost citizens’ and businesses’ cyberdefenses</a> and teach people to identify and combat disinformation.</p>
    <p>Disinformation is a <a href="https://www.fpri.org/article/2015/10/russian-propaganda-disinformation-and-estonias-experience/" rel="nofollow external" class="bo">key part of Russia’s overall effort</a> to undermine Western governments. As a result, the battle is ever-changing, with Russians constantly trying new angles of attack and target countries like the Baltic nations identifying and thwarting those efforts. The most effective responses will involve coordination between <a href="https://www.stratcomcoe.org/government-responses-malicious-use-social-media" rel="nofollow external" class="bo">governments</a>, <a href="https://www.stratcomcoe.org/industry-responses-malicious-use-social-media" rel="nofollow external" class="bo">commercial technology companies</a> and the <a href="https://www.stratcomcoe.org/role-communicators-countering-malicious-use-social-media" rel="nofollow external" class="bo">news industry and social media platforms</a> to identify and address disinformation.</p>
    <p>A similar approach may work in the U.S., though it would require far more collaboration than has existed so far. But backed by the new government motivation to <a href="https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf" rel="nofollow external" class="bo">strike back when provoked</a>, the methods used in the Baltic states and across Europe could provide a powerful new <a href="https://theconversation.com/cybersecuritys-next-phase-cyber-deterrence-67090" rel="nofollow external" class="bo">deterrent against Russian influence</a> in the West.<a href="https://theconversation.com/profiles/terry-thompson-660173" rel="nofollow external" class="bo">Terry Thompson</a>, Adjunct Instructor in Cybersecurity, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/countering-russian-disinformation-the-baltic-nations-way-109366" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/01/countering-russian-disinformation-the-baltic-nations-way/" rel="nofollow external" class="bo">Countering Russian disinformation the Baltic nations’ way</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Countering Russian disinformation the Baltic nations’ way   Terry Thompson, University of Maryland, Baltimore County   As the new Congress begins, it will soon discuss the comprehensive...</Summary>
<Website>https://www.csee.umbc.edu/2019/01/countering-russian-disinformation-the-baltic-nations-way/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81375/guest@my.umbc.edu/a350d593836de7c81b20d53551d95590/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>4</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 10 Jan 2019 22:25:39 -0500</PostedAt>
<EditAt>Thu, 10 Jan 2019 22:25:39 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80330" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80330">
<Title>talk: Challenges of Smart Cities Cybersecurity and Privacy with Blockchain, 11am Thr 11/15</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/blockchain.jpg" alt="" style="max-width: 100%; height: auto;"></p><strong>
    <h1>The Challenges of Smart Cities Cybersecurity and Privacy with Blockchain</h1>
    </strong><p></p>
    <h3>Dr. Jacob Mendel, Tel Aviv University</h3>
    <h3>11:00am Thursday, 15 November 2018, ITE 459, UMBC</h3>
    <p>The last decades have witnessed unprecedented population and urbanization growth with the implication that today, for the first time in human history, more than half of the world’s population lives in cities. The consequences of the cybersecurity threats of this urbanization trend along with the notion of smart cities are the main subject of this session. The smart city (system of systems) integrates Big-data and the Internet of Things (IoT) to optimize the operation cost, efficiency and to provide a better services to the residents. Smart cities worldwide are checking blockchain as the foundation for urban living. Using blockchain technology in smart city can create a marketplace for Smart Grid.</p>
    <p>The increased complexity of smart cities (system of systems), globally connected, economic and political systems has increased the cybersecurity vulnerability. The cybersecurity threats get magnified by the city big-data and its dependency on the technology. The cybersecurity challenges that smart cities faces demand for research and investment in physical security and economic security. In this session we will highlight various cybersecurity and blockchain parameters of a smart city, existing cybersecurity challenges and possible solutions.</p>
    <p><a href="https://www.linkedin.com/in/dr-jacob-mendel-83650062/" rel="nofollow external" class="bo">Dr. Jacob Mandel</a> is The Moshe Hogeg Blockchain Research Institute managing director at the Tel Aviv University, and former the General Manager Cyber Security COE at Intel. He is a serial cyber security entrepreneur; He has been the CEO and Co-Founder of SCsquare Ltd., where he founded a business enabler for cybersecurity technologies. Dr. Jacob holds 16 approved patents in the area of cybersecurity. His career in cybersecurity over the past 20 years is a unique mixture of broad practical experience and research expertise. His practice included extensive involvement in cybersecurity offensive projects (software and hardware), business development and product management. Proven worldwide track records in secure operating systems, digital rights management, security certification (CC, FIPS), penetration test, reverses engineering, Machine Learning, Blockchain, IoT security and Smart Grid cybersecurity.</p>
    <p>His current main research interest is on The Economic Perspective on Smart Grid Cybersecurity and Blockchain technology with a special focus on malware attacks, privacy issues and business continuation. He holds a PhD in Economics from Poznan University of Economics and Business, Poland and Masters of Business Administration (MBA) degree from Ben-Gurion University of the Negev, Israel.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/talk-challenges-of-smart-cities-cybersecurity-and-privacy-with-blockchain-11am-thr-11-15/" rel="nofollow external" class="bo">talk: Challenges of Smart Cities Cybersecurity and Privacy with Blockchain, 11am Thr 11/15</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The Challenges of Smart Cities Cybersecurity and Privacy with Blockchain     Dr. Jacob Mendel, Tel Aviv University   11:00am Thursday, 15 November 2018, ITE 459, UMBC   The last decades have...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/talk-challenges-of-smart-cities-cybersecurity-and-privacy-with-blockchain-11am-thr-11-15/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80330/guest@my.umbc.edu/2a2bf81bd171488351077035c9b9804a/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 13 Nov 2018 08:15:00 -0500</PostedAt>
<EditAt>Tue, 13 Nov 2018 08:15:00 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80114" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80114">
<Title>talk: Legal Aspects of Privacy and Data Protection, 12-1 Fri 11/9</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/data_privacy_2018.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1>Legal Aspects of Privacy and Data Protection</h1>
    <h3>Razvan Miutescu<br>
    Privacy Counsel, Whiteford, Taylor &amp; Preston</h3>
    <h3>12:00–1:00pm Friday, 9 November 2018, ITE 227, UMBC</h3>
    <p>Privacy and data security continue to be topics of interest for organizations of all sizes. In addition to being concerned about cyber crimes and data breaches occurring more frequently and with higher operational impact, consumers and regulators around the world are focusing on privacy. Individuals are becoming increasingly aware of the value and the use of the information that identifies them or analyzes their conduct and behavior. Privacy laws around the world are becoming stricter. The European Union’s <a href="https://en.wikipedia.org/wiki/General_Data_Protection_Regulation" rel="nofollow external" class="bo">General Data Protection Regulation</a> (GDPR) is viewed as a flagship law that imposes data protection requirements well beyond the borders of the European Economic Area. California recently passed its Consumer Privacy Act, which borrows concepts from the GDPR, leaving no doubt that privacy laws in the United States are also on track to become more complex. In this context, we will discuss practical legal approaches to an organization’s privacy and data security program.</p>
    <p><a href="https://www.wtplaw.com/professionals/razvan-e-miutescu" rel="nofollow external" class="bo">Razvan Miutescu</a> is a technology and information governance attorney with Whiteford, Taylor &amp; Preston. His practice focuses on privacy and data security, information technology transactions and licensing, intellectual property, and data management, including data broker transactions, cloud services, distributed ledgers/blockchain, and related regulatory and compliance matters. Email: *protected email*</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The <a href="https://cisa.umbc.edu/cdl/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a> meets biweekly Fridays. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/talk-legal-aspects-of-privacy-and-data-protection-12-1-fri-11-9/" rel="nofollow external" class="bo">talk: Legal Aspects of Privacy and Data Protection, 12-1 Fri 11/9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Legal Aspects of Privacy and Data Protection   Razvan Miutescu  Privacy Counsel, Whiteford, Taylor &amp; Preston   12:00–1:00pm Friday, 9 November 2018, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/talk-legal-aspects-of-privacy-and-data-protection-12-1-fri-11-9/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80114/guest@my.umbc.edu/e8a22fb19468481f39cdcfa024b0c615/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 12:26:47 -0500</PostedAt>
<EditAt>Tue, 06 Nov 2018 12:26:47 -0500</EditAt>
</NewsItem>

</News>
