3rd Annual CWIT Spring into Leadership Event, April 11

The UMBC Center for Women in Technology will hold its 3rd Annual CWIT Spring into Leadership event on Thursday evening, April 11, 2013 in the University Center Ballroom at UMBC. Space is limited and registration is required. Register online by Monday, April 8.

Schedule
   6:15-6:30 Check-in and Refreshments, UC 3rd floor
   6:30-7:00 Networking Activity, Dessert will be served!
   7:10-7:30 Keynote Speaker's Story: Tina Kuhn, Northrop Grumman Corporation
   7:30-7:45 Discussion Activity and Q&A with Ms. Kuhn
   7:45-8:00 Wrap-Up & Evaluations

Keynote Speaker:

Ms. Tina Kuhn
Vice President, Security and Information Operations
Cyber Intelligence Division
Northrop Grumman Information Systems

Ms. Kuhn will share information about her career path and offer advice and wisdom based on her personal experiences as a successful technical leader.

tina_kuhn Tina Kuhn is vice president of Security and Information Operations (S&IO) in the Cyber Solutions division of Northrop Grumman’s Information Systems sector. The S&IO business unit provides intelligence-related systems and services to U.S. government and international security customers. The organization’s focus is on full-spectrum cyber solutions that protect critical national systems and support the nation’s information dominance. S&IO also is a premier supplier and integrator of net-centric, next-generation signal processing solutions for specialized customers. Ms. Kuhn brings more than 25 years of management experience to her current position. She joined Northrop Grumman from General Dynamics, where she served as vice president of its Intelligence Systems line of business, leading three business units that addressed the cyber and intelligence communities. Prior to that, she was the vice president/director of programs for the Intelligence and Information Solutions business unit for SAIC in Columbia MD. Ms. Kuhn began her career at General Electric and also held positions at GTE Corp. Ms. Kuhn has a bachelor’s degree in information systems management from the University of Maryland and also is a certified Program Management Professional.

 

The event is co-hosted by the Center for Women in Technology, CWIT Student Council, IS Council of Majors, SWE, ASME, and the WISE graduate student organization. Contact Dr. Susan Martin, Associate CWIT Director as susan at umbc.edu if you have any questions about the event or registering online.

 

Newspaper's online poll on Internet voting compromised to make a point

internet_voting

Rick Forno, Assistant Director of the UMBC Center for Cybersecurity, was quoted in an article in the Louisville KY Courier-Journal about a compromised online poll the paper ran about Internet voting. The paper's March 20th poll was prompted by a Kentucky initiative to make voting easier for overseas personnel and asked "Should overseas U.S. military personnel be allowed to vote via the Internet?".

University of South Carolina computer science professor Duncan Buell and his students cast tens of thousands of votes for the "No, the possibility of fraud is just too great" response to highlight the potential risks of online voting.  Before the poll was shut down, more than 91% of the votes cast were negative and only 7% were positive ("Yes, it can be made just as secure as any balloting system").

In the Courier-Journal article, Forno pointed commented on relatively low security for most online polls.

But the difference between an online newspaper poll and state-run online election balloting is “night and day,” said Richard Forno, director of the Graduate Cybersecurity Program at the University of Maryland Baltimore County and assistant director of the university’s Center for Cybersecurity. “I’m not saying it’s impossible to hack some online voting for a state election, but it’s much more difficult to do it there” than with the newspaper’s poll, Forno said. A state election system “would have far more security features built in,” he said.  …   Forno said hacking generally is on the increase in the United States. “We’re seeing more and more cyber-related incidents” of all kinds, ranging from foreign theft of the intellectual property of U.S. companies to theft of personal information and webpage defacement, he said.

The security of voting systems is a specialty of UMBC Professor Alan Sherman, whose Center for Information Security and Assurance has worked on secure voting systems for more than ten years. In 2009, Sherman and his students helped the city of Takoma Park, Maryland use the Scantegrity voting system — the first time any end-to-end cryptographic system will be used in a binding governmental election.

UMBC's Rick Forno on Protecting Your Financial Data From Cyberattacks

As more corporate and personal data moves online, Assistant Director at the UMBC Center for Cybersecurity Richard Forno provides tips on protecting financial information before a cyberattack hits.

In this video, Mariko Sanchanta of the Wall Stree Journal Digital Network interviews Dr. Rick Forno on the risks of cyberattacks on banks and other financial insititutions.

Shafi Goldwasser & Silvio Micali win Turing Award for work on cryptographic security

2012 Turing Award Winners

"Shafi Goldwasser of MIT and the Weizmann Institute of Science and Silvio Micali of MIT were names as the winners of the 2012 ACM A.M. Turing Award. Working together, they pioneered the field of provable security, which laid the mathematical foundations that made modern cryptography possible. By formalizing the concept that cryptographic security had to be computational rather than absolute, they created mathematical structures that turned cryptography from an art into a science.

Their work addresses important practical problems such as the protection of data from being viewed or modified, providing a secure means of communications and transactions over the Internet. Their advances led to the notion of interactive and probabilistic proofs and had a profound impact on computational complexity, an area that focuses on classifying computational problems according to their inherent difficulty.

The ACM Turing Award, widely considered the "Nobel Prize in Computing," carries a $250,000 prize, with financial support provided by Intel Corporation and Google Inc."

…more…

Webinar on Certificate in Cyber Operations training program

pshdr2

UMBC's Training Centers is offering a new Certificate in Cyber Operations that is designed to help move participants from a basic competence with computers and technology up to the level of a competent, entry-level professional as a Cyber Analyst or Operator.

Homer Minnick, the Training Centers' director for Cybersecurity training, will host a free webinar on the certificate program from 12:00-1:00pm on Wednesday March 27, 2013. It will include the following topics.

  • What is the Cybersecurity Academy?
  • Is the Certificate in Cyber Operations right for me?
  • How does the Certificate in Cyber Operations contrast with other certifications from UMBC Training Centers?”
  • What are the education and experience eligibility requirements?
  • Which industry certifications are included in this program?
  • What is the value this certification brings to my organization?
  • How do you apply for the program?
  • What is the next step? Where do I get more information?

    If you are interested in participating, please register online for the free webinar.

    talk: Privacy and Security in Online Social Media, 10:30 3/11

    precog_logo copy

    Privacy and Security in Online Social Media (PSOSM)

    Ponnurangam Kumaraguru ("PK")
    Assistant Professor
    Indraprastha Institute of Information Technology, Delhi, India

    10:30-12:00 Monday, March 11, 2013, ITE 325b, UMBC

    With increase in usage of the Internet, there has been an exponential increase in the use of online social media on the Internet. Websites like Facebook, Google+, YouTube, Orkut, Twitter and Flickr have changed the way Internet is being used. There is a dire need to investigate, study and characterize privacy and security on online social media from various perspectives (computational, cultural, psychological). Real world scalable systems need to be built to detect and defend security and privacy issues on online social media. This talk will give you a preview of what we do at PreCog in the area of PSOSM. I will describe briefly some of the cool ongoing projects that we have: ChaMAILeon, PhishAri, Twit-Digest, U2P2, and OCEAN. Much of our research work is made available for public use through tools or online services. Our work derives techniques from Data Mining, Text Mining, Statistics, Network Science, Public Policy, Complex networks, Human Computer Interaction, and Psychology.

    In this talk, I will focus on the following: (1) Twit-Digest is a tool to extract intelligence from Twitter which can be useful to security analysts. Pro-cursor to this work is published at PSOSM 2012, this work also obtained second best award at IBM ICARE 2012. (2) OCEAN: Open source Collation of eGovernment data and Networks. Here, we show how publicly available information on Government services can be used to profile citizens in India. This work obtained the Best Poster Award at Security and Privacy Symposium at IIT Kanpur, 2013. (3) Privacy in India: Attitudes and Awareness V 2.0 U2P2, this is one of the largest ever done privacy study in India. This has been in media recently; if you are interested search for #privacyindia12 on Twitter. This work obtained the third Best Poster Award at Security and Privacy Symposium at IIT Kanpur, 2013.

    Ponnurangam Kumaraguru ("PK") Assistant Professor, is currently the Hemant Bharat Ram Faculty Research Fellow at the Indraprastha Institute of Information Technology (IIIT), Delhi, India. He received his Ph.D. from the School of Computer Science at Carnegie Mellon University (CMU). His research interests include developing technological and inter-disciplinary solutions to detect and prevent computer crime, in particular, these days be has been dabbling with complex networked systems (e.g. social web systems like Twitter, Facebook, and telephone logs). He is also very passionate about issues related to human computer interaction. As Principal Investigator, PK is currently managing research projects value of about 2 Crores INR. PK is a Co-Principal Investigator in a project that is approved at the Europe Union FP7 which is about 5.3 million Euros. PK has received research funds Government of India, National Science Foundation, industry bodies in India, and International Development Research Centre. He is serving as a PC member in WWW 2013, AsiaCCS 2013 and he is also serving as a reviewer for International Journal of Information Security and ACM's Transactions on Internet Technology. PK’s Ph.D. thesis work on anti-phishing research at Carnegie Mellon University has contributed in creating a successful start-up company, Wombat Security Technologies. PK founded and manages PreCog, a research group at IIIT-Delhi. PK can be reached at .

    UMBC Cyber Academy: certificate in computer network operations

    UMBC Training Centers has launched the Cyber Academy to address the tremendous need for Cyber professionals in the workforce.  The Cyber Academy is a full time, intensive training program designed to prepare students for immediate employment in Cybersecurity job specialties within government and industry. The Cyber Academy – Certificate in Computer Network Operations will develop civilians and military personnel from a basic competence with computers and technology up to the level of a competent, entry-level professional as a Cyber Analyst or Operator. This program is closely aligned with the recent National Institute of Standards and Technology (NIST) release of the National Initiative for Cybersecurity Education (NICE) framework. Applications for the Cyber Academy – Certificate in Computer Network Operations program will be accepted in mid-February. If you are interested in being notified when the official application process opens up, please click here.

    Program Details

    The Cyber Academy – Certificate in Computer Network Operations will prepare students for a role within an organization in cybersecurity defense, vulnerability assessment or penetration testing. Topics covered include the following.

    • Hardware and Computer Architecture
    • Networking
    • Network Security Fundamentals
    • Basic Programming and Scripting
    • Windows Operating System Fundamentals and Administration
    • Linux Operating System Fundamentals and Administration
    • Basic Network Attack Methodology
    • Malware Analysis

    Professional Certifications

    The Cyber Academy – Certificate in Computer Network Operations enables program participants to earn the following professional industry certifications.

    These certifications illustrate to employers your professional achievements and your dedication to ongoing professional development. Additionally, there are many roles in the government and with government contractors that require these certifications, such as those required by DoD Directive 8570.

    Selection into the Cyber Academy will be based on the following components.

    • “Whole person” approach
    • Aptitude assessment
    • Tiered knowledge assessments
    • Security screening (National Agency Check)
    • Prior educational and work history
    • Passion and initiative

    Program Logistics

    The Cyber Academy – Certificate in Computer Network Operations is a four month full time program which will begin in June and run through September, 2013. Classes will be held every weekday from 8:30 a.m. until 5:00 p.m. at 6996 Columbia Gateway Drive, Columbia, MD 21046. For the inaugural open enrollment Cyber Academy – Certificate in Computer Network Operations cohort, the cost will be $14,995.00 per student. Students have the option of paying for this outright or can participate in a tuition deferral program which is described below. Under the tuition deferral program, $4,995.00 is paid at the beginning of the program. Within 12 months of completing the program, when a student obtains employment as an IT or cyber professional, the outstanding balance is due for their training. This can be paid for by their employer or by the student.

    Audience

    This program has two core audiences:

    • Current employees of organizations who require additional hands-on training to meet existing cyber workforce gaps. These employees can have little IT background and be taken through the entire program, or can come with basic foundational skills and moved directly into training for a specific specialty area.
    • Individuals seeking to enter the fields of information technology and cybersecurity who are interested in employment with government agencies, government contractors and commercial enterprises in the region. While cyber is the primary focus, this program provides excellent preparation for work in any commercial or civilian IT organization.

    Cybersecurity graduate programs information session, 2013-3-21

    The nation's demand for skilled cybersecurity professionals continues to rise. The UMBC Cybersecurity Graduate Program will hold an information session from 6:00pm to 7:30pm on Thursday 21 March in room 102 of the Information Technology and Engineering Building (ITE). Participants will learn how our masters and certificate programs can help you get started or advance in this thriving industry, meet the Graduate Program Director and learn more about our program’s curriculum and flexible class schedules. We are now accepting applications for Fall 2013 with a deadline of 1 August, 2013. RSVP for the Cybersecurity information session online to reserve a seat.

    UMBC is certified as a Center for Academic Excellence in Information Assurance Education (CAE) as well as a Center of Academic Excellence in Research (CAE-R) sponsored by the National Security Agency and Department of Homeland Security (DHS). View or download our fact sheet for a summary of the cybersecurity programs.

    Professor Anupam Joshi to speak at Security & Privacy Symposium

    JoshiCSEE professor Anupam Joshi–director of the new UMBC Center for Cybersecurity–has been invited to give a keynote talk at the Security & Privacy Symposium. The symposium will take place at the Indian Institute of Technology in Kanpur India from February 28 to March 1. His talk is entitled “A Semantically Rich approach to Cybersecurity”.

    The objective of the symposium is to bring together students, faculty, and researchers from across India to discuss the growing field of security and privacy. Dr. Joshi joins a dozen fellow scholars who will discuss topics including emerging security and privacy challenges and privacy and security in online social media.

    Dr. Joshi is an Oros Family Professor of Technology. He has been a Professor of Computer Science and Electrical Engineering (CSEE) at the University of Maryland, Baltimore County (UMBC) for more than a decade, teaching courses in Mobile Computing, Security, Social Media, and Operating Systems at the graduate and undergraduate levels.

    His own research interests deal with Intelligent Networked Systems, with a focus on Mobile Computing. He has recently received a grant from NSF’s Secure and Trustworthy Cyberspace (SaTC) program, a three year project to investigate how to better manage security and privacy constraints while querying semantically annotated linked data sources. The project, Policy Compliant Integration of Linked Data, is a collaboration with researchers at M.I.T. and the University of Texas at Dallas.

    JOB: JHU APL Cybersecurity

    IOtop

    Help shape the future of warfare through cyber operations. It’s what we do in the Asymmetric Operations Department at The Johns Hopkins University Applied Physics Laboratory (APL)—a national leader in scientific research and development, located midway between Baltimore and Washington, DC.

    The Asymmetric Operations Department supports the U.S. government by applying research capabilities to high-priority problems in cybersecurity, special operations, and homeland protection. Our department has many full-time opportunities available and will be holding a career fair on Wednesday, March 6, 2013, 3:30–8pm

    We're seeking individuals with skills and interest in the following areas: Big Data Analytics, Cloud Computing, Communication Systems Engineering, Computer Engineering, Computer Security, Digital Forensics, Embedded Software Engineering, Identification, Tagging, Tracking, and Location Systems, Information Assurance, Mobile OS and Application Development, Modeling and Simulation, Network Architecture, Network Vulnerabilities and Exploits, Real-Time Software Engineering, Reverse Engineering, Secure Platform Architecture, Sensor Technologies, Situational Awareness and Analysis (Cyber, Global, Bio), Software and System Architecture (Component, Platform, Enterprise), Systems Engineering, Systems Testing and Evaluation, Web Software Development, Wireless Network Engineering and Wireless Security.

    Meet our hiring managers at our career fair and find out how your technical experience can help develop the next advances in cyber systems or technologies for special applications.

    All positions require a minimum of a bachelor’s degree and the ability to obtain a security clearance. U.S. citizenship is required to obtain a clearance. Preregistration is strongly encouraged. This allows hiring managers to review your resume in advance of the career fair and may result in a preliminary interview on the day of the fair.

    1 33 34 35 36 37 43