<?xml version="1.0"?>
<News hasArchived="false" page="66" pageCount="221" pageSize="10" timestamp="Thu, 30 Apr 2026 13:17:44 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=66">
<NewsItem contentIssues="true" id="70882" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70882">
<Title>talk: Keith Mayes on Attacks on Smart Cards, RFIDs and Embedded System</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/smartcard.jpg" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1>Attacks on Smart Cards, RFIDs and Embedded Systems</h1>
    <h3><a href="https://pure.royalholloway.ac.uk/portal/en/persons/keith-mayes(290542c6-8422-457e-85c0-cc4dde743624).html" rel="nofollow external" class="bo">Prof. Keith Mayes</a><br>
    Royal Holloway University of London</h3>
    <h3>10-11:00am Tuesday, 10 October 2017, ITE 325, UMBC</h3>
    <p>Smart Cards and RFIDs exist with a range of capabilities and are used in their billions throughout the world. The simpler devices have poor security, however, for many years, high-end smart cards have successfully been used in a range of systems such as banking, passports, mobile communication, satellite TV etc. Fundamental to their success is a specialist design to offer remarkable resistance to a wide range of attacks, including physical, side-channel and fault. This talk describes a range of known attacks and the countermeasures that are employed to defeat them.</p>
    <p>Prof. Keith Mayes is the Head of the School of Mathematics and Information Security at Royal Holloway University of London. He received his BSc (Hons) in Electronic Engineering in 1983 from the University of Bath, and his PhD degree in Digital Image Processing in 1987. He is an active researcher/author with 100+ publications in numerous conferences, books and journals. His interests include the design of secure protocols, communications architectures and security tokens as well as associated attacks/countermeasures. He is a Fellow of the Institution of Engineering and Technology, a Founder Associate Member of the Institute of Information Security Professionals, a Member of the Licensing Executives Society and a member of the editorial board of the Journal of Theoretical and Applied Electronic Commerce Research (JTAER).</p>
    <p> </p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/talk-keith-mayes-attacks-smart-cards-rfids-embedded-system-cybersecurity-rfid/" rel="nofollow external" class="bo">talk: Keith Mayes on Attacks on Smart Cards, RFIDs and Embedded System</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Attacks on Smart Cards, RFIDs and Embedded Systems   Prof. Keith Mayes  Royal Holloway University of London   10-11:00am Tuesday, 10 October 2017, ITE 325, UMBC   Smart Cards and RFIDs exist...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/talk-keith-mayes-attacks-smart-cards-rfids-embedded-system-cybersecurity-rfid/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70882/guest@my.umbc.edu/b389c888c96e7ad4aee560d560fa05f1/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 06 Oct 2017 21:46:20 -0400</PostedAt>
<EditAt>Fri, 06 Oct 2017 21:46:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="70865" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70865">
<Title>ACM Welcome Back Picnic - 10/10/17 12:00pm-2:00pm</Title>
<Body>
<![CDATA[
    <div class="html-content"><div>Hello All,</div><div><br></div><div>A very warm welcome to all the new UMBC Retrievers and all of those who've walked these halls a lot longer, welcome home!</div><div><br></div><div>While the semester is still in second gear, we at the CSEE department, particularly the ACM Student Chapter would like to invite you to our 'ACM CSEE Welcome back picnic - 2017' for some free but delicious food and conversation. </div><div><br></div><div>Location:<strong> University Center Room 312</strong></div><div>Date: <strong><span><span>October 10, 2017</span></span></strong></div><div>Time:<strong> <span><span>12:00pm to 2:00pm</span></span></strong></div><div><strong>Limited to CSEE Faculty, Staff &amp; Students.</strong></div><div><br></div><div>It would be a great opportunity for students and faculty to geek out and socialize outside the classroom. </div><div><br></div><div>Hope to see you there. </div><div><br></div><div>Once again, welcome!</div><div><br></div><div><strong>ACM Student Chapter and CSEE department</strong></div><div><br></div><div><br></div><div><div><div>------</div><div>Sincerely,<div>Nisha Pillai</div></div></div></div></div>
]]>
</Body>
<Summary>Hello All,     A very warm welcome to all the new UMBC Retrievers and all of those who've walked these halls a lot longer, welcome home!     While the semester is still in second gear, we at the...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70865/guest@my.umbc.edu/7cc88dc0f778438d9e90782eb1f204c5/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 06 Oct 2017 11:41:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="70794" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70794">
<Title>talk: Shukla on Predictability and Prediction of Asian Summer Monsoon, 2pm Tue 10/10</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/27771.jpg" style="max-width: 100%; height: auto;"></p>
    <h3>CHMPR Distinguished Lecture Series</h3>
    <h1>Predictability and Prediction of Asian Summer Monsoon</h1>
    <h2>Dr. Jagadish Shukla, George Mason University</h2>
    <h3>2:30pm Tuesday, October 10, 2017, ITE 325, UMBC<br>
    Coffee &amp; Tea at 2:00pm</h3>
    <p>The chaotic nature of the atmosphere puts an upper limit of about two weeks for deterministic prediction of weather. Yet, there is evidence for predictability in the midst of chaos. Societally beneficial dynamical seasonal predictions of short-term climate variations are routinely being made by modeling the interactions among atmosphere, ocean, and land processes. The first part of the seminar will review the evolution of our field from weather prediction to climate prediction.</p>
    <p>The second part of the seminar will describe the results for prediction of Asian Summer Monsoons. It will be shown that after 50 years of climate modeling, the fidelity of climate models has improved so that it is possible to produce a skillful prediction of Asian Summer Monsoon rainfall. The seminar will give a historical overview of monsoon forecasting and will present the results of re-forecasting summer monsoon rainfall in the past 57 years (1958-2014) using the NCEP Climate Forecast System. It will be shown that if the modern day coupled climate models were available during the 1970’s, even with the limited ocean observations at that time, it should have been possible to predict the 1972-73 ENSO event and the associated severe monsoon drought over India. Finally, the prospects and future challenges for skillful dynamical seasonal prediction will be described.</p>
    <p><a href="http://cola.gmu.edu/shukla/" rel="nofollow external" class="bo">J. Shukla</a> was born in 1944 in a small village (Mirdha) in the Ballia district of Uttar Pradesh, India. This village had no electricity, no roads or transportation, and no primary school building. Most of his primary school education was received under a large banyan tree. He passed from the S.R.S. High School, Sheopur, in the first class with distinction in Mathematics and Sanskrit. He was unable to study science in high school because none of the schools near his village included science education. His father, the late Shri Chandra Shekhar Shukla, asked him to read all the science books for classes 6 through 10 during the summer before he was admitted to the S.C. College, Ballia, to study science. After passing the twelfth grade from S.C. College, he went to Banaras Hindu University (B.H.U.) where, at the age of 18, he passed BS (honors) with Physics, Mathematics, and Geology in the first class and then earned the MS in Geophysics in the first class in 1964. He received Ph.D. in Geophysics from BHU in 1971 and ScD in Meteorology from MIT in 1976</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/talk-shukla-on/" rel="nofollow external" class="bo">talk: Shukla on Predictability and Prediction of Asian Summer Monsoon, 2pm Tue 10/10</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>CHMPR Distinguished Lecture Series   Predictability and Prediction of Asian Summer Monsoon   Dr. Jagadish Shukla, George Mason University   2:30pm Tuesday, October 10, 2017, ITE 325, UMBC  Coffee...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/talk-shukla-on/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70794/guest@my.umbc.edu/049815b536532076555f15125bbb47cd/api/pixel</TrackingUrl>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 04 Oct 2017 15:01:53 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="70752" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70752">
<Title>HackUMBC hackathon, Saturday-Sunday 7-8 October 2017</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/09/hackumbc-1024x536.jpg" style="max-width: 100%; height: auto;"></p>
    <h1>HackUMBC hackathon, Saturday-Sunday 7-8 October 2017</h1>
    <p><a href="http://hackumbc.org/" rel="nofollow external" class="bo">HackUMBC</a> is a 24-hour tech innovation marathon where students across the East Coast collaborate on new ideas to build mobile, web and hardware projects. HackUMBC invites diverse groups of students, undergraduate, graduate and high school students over 18, to enjoy a weekend of hacking, workshops, tech talks, networking, and other fun activities. At the end of 24 hours, projects are presented and judged for different prize categories from sponsors and other organizations.</p>
    <p><strong>What if I don’t have a team or an idea?</strong>: No problem! You can find a team once you arrive. Most hackers arrive without a team. You will often find inspiration for ideas at the hackathon.</p>
    <p><strong>What if I don’t code?</strong>: This is the perfect opportunity to learn something new! There will be workshops geared towards beginners and mentors to help you throughout the event.</p>
    <p><strong>What can I build?</strong>: Anything! Web, mobile, desktop, and hardware projects are all welcome. Projects will be judged based on creativity, technical difficulty, polish, and usefulness.</p>
    <p><strong>Will there be hardware?</strong> HackUMBC has partnered with MLH to provide hardware hacking resources to all hackers. Check out the full list of <a href="https://mlh.io/hardware-lab" rel="nofollow external" class="bo">hardware</a>.</p>
    <p><strong>How much does it cost?</strong> HackUMBC is free! Food, beverages, swag, workspaces, and sleeping areas will be provided. You just have to travel to the event and we will take care of the rest!</p>
    <p>The event starts in Meyerhoff 030 at 10:00am on Saturday, October 7 and ends at 3:30pm on Sunday, October 8. Visit the <a href="http://hackumbc.org/" rel="nofollow external" class="bo">HackUMBC</a> site for complete details and to register.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/hackumbc-hackathon-saturday-sunday-7-8-october-2017/" rel="nofollow external" class="bo">HackUMBC hackathon, Saturday-Sunday 7-8 October 2017</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>HackUMBC hackathon, Saturday-Sunday 7-8 October 2017   HackUMBC is a 24-hour tech innovation marathon where students across the East Coast collaborate on new ideas to build mobile, web and...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/hackumbc-hackathon-saturday-sunday-7-8-october-2017/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70752/guest@my.umbc.edu/6f18a4dfecf7041cad9b5fbbee8e841b/api/pixel</TrackingUrl>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>9</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 03 Oct 2017 13:56:27 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="70685" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70685">
<Title>*REMINDER* First GBM</Title>
<Body>
<![CDATA[
    <div class="html-content">Good Morning Everyone,<div><br></div><div>Today we will be holding our first GBM during free hour at ITE 459. We will be going over future events! Get excited! Bring your friends!</div><div><br></div><div>Hope to see you there!</div><div><br></div><div><br></div></div>
]]>
</Body>
<Summary>Good Morning Everyone,    Today we will be holding our first GBM during free hour at ITE 459. We will be going over future events! Get excited! Bring your friends!     Hope to see you there!</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70685/guest@my.umbc.edu/5f6f42af548e32a4cc30a4ea1c80bdc0/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 02 Oct 2017 10:01:02 -0400</PostedAt>
<EditAt>Mon, 02 Oct 2017 10:01:46 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="70570" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70570">
<Title>talk: James R. Clapper, former US Director of Intelligence, 12-1pm Fri. Oct 6, 132 PAHB, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/09/james_clapper.jpg" style="max-width: 100%; height: auto;"></p>
    <h1>Lecture by James Clapper, former US Director of Intelligence, 12-1pm Fri. Oct. 6 at UMBC</h1>
    <p>James R. Clapper, former US Director of Intelligence, will give a public lecture on Friday, 6 October 2017 in the lecture hall (room 132) of the Performing Arts &amp; Humanities Building at UMBC.</p>
    <p>The Honorable James R. Clapper served as the fourth US Director of Intelligence from August 9, 2010 to January 20, 2017. In this position, Mr. Clapper led the United States Intelligence Community and served as the principal intelligence advisor to President Barack Obama.</p>
    <p>Mr. Clapper retired in 1995 after a distinguished career in the U.S. Armed Forces. His career began in 1961 when he enlisted in the U.S. Marine Corps Reserve and culminated as a lieutenant general in the U.S. Air Force and Director of the Defense Intelligence Agency. His intelligence-related positions over his 32 years in uniform included Assistant Chief of Staff for Intelligence at Headquarters, US Air Force during Operations Desert Shield/Desert Storm, and Director of Intelligence for three combatant commands: US Forces, Korea; Pacific Command, and Strategic Air Command. He served two combat tours during the Southeast Asia conflict, and flew 73 combat support missions in EC-47’s over Laos and Cambodia.</p>
    <p>Directly following his retirement, Mr. Clapper worked in industry for six years as an executive in three successive companies with the Intelligence Community as his business focus. He also served as a consultant and advisor to Congress and to the Departments of Defense and Energy, and as a member of a variety of government panels, boards, commissions, and advisory groups. He was a senior member of the Downing Assessment Task Force which investigated the Khobar Towers bombing in 1996, was vice chairman of a commission chaired by former Governor Jim Gilmore of Virginia on the subject of homeland security, and served on the NSA Advisory Board.</p>
    <p>Mr. Clapper returned to the government two days after 9/11 as the first civilian director of the National Imagery and Mapping Agency (NIMA). He served in this capacity for almost five years, transforming it into the National Geospatial-Intelligence Agency (NGA) as it is today.</p>
    <p>Prior to becoming the Director of National Intelligence, Mr. Clapper served for over the three years in two Administrations as the Under Secretary of Defense for Intelligence, where he served as the principal staff assistant and advisor to the Secretary and Deputy Secretary on intelligence, counterintelligence, and security matters for the Department. In this capacity, he was also dual-hatted as the Director of Defense Intelligence for the DNI.</p>
    <p>Mr. Clapper earned a bachelor’s degree in government and politics from the University of Maryland, a master’s degree in political science from St. Mary’s University, San Antonio, Texas, and an honorary doctorate in strategic intelligence form the then Joint Military Intelligence College.</p>
    <p>His awards include three National Intelligence Distinguished Service Medals, two Defense Distinguished Service Medals, the Air Force Distinguished Service Medal, the Coast Guard’s Distinguished Public Service Award, three Department of Defense Distinguished Civilian Service Awards, the Presidentially-conferred National Security Medal, and many other U.S. civilian and military, as well as foreign government awards and decorations.</p>
    <p>He is married to the former Susan Terry, and they have two grown children and four grandchildren</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/09/talk-james-r-clapper-former-us-director-of-intelligence-12-1pm-fri-oct-6-132-pahb-umbc/" rel="nofollow external" class="bo">talk: James R. Clapper, former US Director of Intelligence, 12-1pm Fri. Oct 6, 132 PAHB, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Lecture by James Clapper, former US Director of Intelligence, 12-1pm Fri. Oct. 6 at UMBC   James R. Clapper, former US Director of Intelligence, will give a public lecture on Friday, 6 October...</Summary>
<Website>https://www.csee.umbc.edu/2017/09/talk-james-r-clapper-former-us-director-of-intelligence-12-1pm-fri-oct-6-132-pahb-umbc/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70570/guest@my.umbc.edu/e3c084b8e0949a8b10e8284063aff28a/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 27 Sep 2017 13:45:01 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="70442" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70442">
<Title>Equifax breach is a reminder of society&#8217;s larger cybersecurity problems</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2017/09/file-20170920-16437-j8jnh5.jpg" style="max-width: 100%; height: auto;">There are a lot more holes in cybersecurity fences. <span><a href="https://www.shutterstock.com/image-photo/opening-metallic-fence-against-blue-sky-115408414" rel="nofollow external" class="bo">iomis/Shutterstock.com</a></span><h1><strong>Equifax breach is a reminder of society’s larger cybersecurity problems</strong></h1>
    <p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>The <a href="https://www.riskbasedsecurity.com/2017/09/equifd-equifax-breach-response-off-to-a-rough-start/" rel="nofollow external" class="bo">Equifax data breach</a> was yet another cybersecurity incident involving the theft of significant personal data from a large company. Moreover, it is another reminder that the modern world depends on critical systems, networks and data repositories that are not as secure as they should be. And it signals that these data breaches will continue until society as a whole (industry, government and individual users) is able to objectively assess and improve cybersecurity procedures.</p>
    <p>Although this specific incident is <a href="https://www.nbcnews.com/tech/security/massive-equifax-data-breach-could-impact-half-u-s-population-n799686" rel="nofollow external" class="bo">still under investigation</a>, the fact that breaches like this have been happening – and getting bigger – for more than a decade provides cybersecurity researchers another opportunity to examine why these events keep happening. Unfortunately, there is plenty of responsibility for everyone.</p>
    <p>Several major problems need to be addressed before people can live in a truly secure society: For example, companies must find and hire the right people to actually solve the overall problems and think innovatively rather than just fixing the day-to-day issues. Companies must be made to get serious about cybersecurity – at a time when many firms have financial incentives not to, also. Until then, major breaches will keep happening and <a href="https://krebsonsecurity.com/2017/09/experian-site-can-give-anyone-your-credit-freeze-pin/" rel="nofollow external" class="bo">may get even worse</a>.</p>
    <h2>Finding the right people</h2>
    <p>Data breaches are commonplace now, and have widespread effects. The Equifax breach affected <a href="http://money.cnn.com/2017/09/07/technology/business/equifax-data-breach/index.html" rel="nofollow external" class="bo">more than 143 million people</a> – far more than than the 110 million victims <a href="https://www.nytimes.com/2017/05/23/business/target-security-breach-settlement.html?mcubz=0&amp;_r=0" rel="nofollow external" class="bo">in 2013 at Target</a>, the 45 million <a href="https://www.computerworld.com/article/2544306/security0/tjx-data-breach--at-45-6m-card-numbers--it-s-the-biggest-ever.html" rel="nofollow external" class="bo">TJX customers hit in 2007</a>, and significantly more than the 20 million or so current and former government employees in the 2015 <a href="https://www.csoonline.com/article/3130682/data-breach/the-opm-breach-report-a-long-time-coming.html" rel="nofollow external" class="bo">U.S. Office of Personnel Management incident</a>. <a href="https://www.cnbc.com/2017/02/15/yahoo-sends-new-warning-to-customers-about-data-breach.html" rel="nofollow external" class="bo">Yahoo’s 2016 loss of user records</a>, with a purported one billion victims, likely holds the dubious record for most victims in a single incident.</p>
    <p>In part, cybersecurity incidents happen because of how companies – and governments – staff their cybersecurity operations. Often, they try to save money by <a href="https://www.washingtonpost.com/business/the-federal-outsourcing-boom-and-why-its-failing-americans/2014/01/31/21d03c40-8914-11e3-833c-33098f9e5267_story.html" rel="nofollow external" class="bo">outsourcing</a> information technology management, including security. That means much of the insight and knowledge about how networks and computer systems work isn’t held by people who work for the company itself. In some cases, outsourcing such services might save money in the short term but also create a lack of institutional knowledge about how the company functions in the long term.</p>
    <p>Generally speaking, key cybersecurity functions should be assigned to in-house staff, not outside contractors – and who those people are also matters a lot. In my experience, corporate recruiters often focus on identifying candidates by examining their formal education and training along with prior related work experience – automated resume scanning makes that quite easy. However, cybersecurity involves both technical skills and a fair amount of creative thinking that’s not easily found on resumes.</p>
    <p>Moreover, the presence (or absence) of a <a href="http://www.marketwatch.com/story/equifax-ceo-hired-a-music-major-as-the-companys-chief-security-officer-2017-09-15" rel="nofollow external" class="bo">specific college degree</a> or industry certification alone is not necessarily the best indicator of who will be a talented cybersecurity professional. In the late 1990s, the best technical security expert on my team was fresh out of college with a degree in forest science – as a self-taught geek, he had not only the personal drive to constantly learn new things and network with others but also the necessary and often unconventional mindset needed to turn his cybersecurity hobby into a productive career. Without a doubt, there are many others like him also navigating successful careers in cybersecurity.</p>
    <p>Certainly, <a href="https://www.csoonline.com/article/3068177/security/high-demand-cybersecurity-skill-sets.html" rel="nofollow external" class="bo">people need technical skills</a> to perform the basic functions of their jobs – such as <a href="https://www.engadget.com/2017/09/13/equifax-apache-argentina/" rel="nofollow external" class="bo">promptly patching known vulnerabilities</a>, <a href="https://krebsonsecurity.com/2017/09/ayuda-help-equifax-has-my-data/" rel="nofollow external" class="bo">changing default passwords</a> on critical systems before starting to use them and regularly reviewing security procedures to ensure they’re strong and up to date. Knowing not to <a href="https://www.nytimes.com/2017/09/20/business/equifax-fake-website.html" rel="nofollow external" class="bo">direct</a> panicked victims of your security incident to a fraudulent site is helpful, too.</p>
    <p>But to be most effective over the long term, workers need to understand more than specific products, services and techniques. After all, people who understand the context of cybersecurity – like communicating with the public, managing people and processes, and modeling threats and risks – can come from well beyond the computing disciplines.</p>
    <h2>Being ready for action</h2>
    <p>Without the right people offering guidance to government officials, corporate leaders and the public, a problem I call “cyber-complacency” can arise. This remains a danger even though cybersecurity has been a major national and corporate concern since the <a href="http://www.presidency.ucsb.edu/ws/?pid=53066" rel="nofollow external" class="bo">Clinton administration</a> of the 1990s.</p>
    <p>One element of this problem is the so-called “cyber insurance” market. Companies can purchase insurance policies to cover the costs of response to, and recovery from, security incidents like data breaches. <a href="http://www.insurancejournal.com/news/national/2017/09/11/463769.htm" rel="nofollow external" class="bo">Equifax’s policy</a>, for example, is reportedly more than US$100 million; Sony Pictures Entertainment had in place a <a href="http://www.propertycasualty360.com/2014/12/18/sony-pictures-holds-60-million-cyber-policy-with-m" rel="nofollow external" class="bo">$60 million policy</a> to help cover expenses after its 2014 breach.</p>
    <p>This sort of business arrangement – simply transferring the financial risk from one company to another – doesn’t solve any underlying security problems. And since it leaves behind only the risk of some bad publicity, the company’s sense of urgency about proactively fixing problems might be reduced. In addition, it doesn’t address the harm to individual people – such as those whose entire financial histories Equifax stored – when security incidents happen.</p>
    <p>Cybersecurity problems do not have to be just another risk people accept about using the internet. But these problems are not solved by another <a href="https://www.nitrd.gov/cybersecurity/documents/081208_securingcyberspace_44.pdf" rel="nofollow external" class="bo">national plan</a> or <a href="https://www.dhs.gov/topic/cybersecurity-information-sharing" rel="nofollow external" class="bo">government program</a> or public <a href="https://theconversation.com/overcoming-cyber-fatigue-requires-users-to-step-up-for-security-70621" rel="nofollow external" class="bo">grumbling</a> about following decades-old basic cybersecurity <a href="https://www.nist.gov/publications/introduction-computer-security-nist-handbook" rel="nofollow external" class="bo">guidelines</a>.</p>
    <p>Rather, the technology industry must not cut corners when designing new products and administering systems: Effective security guidelines and practices – such as controlling access to shared resources and not making passwords impossible to change in our “internet of things” <a href="https://theconversation.com/its-the-year-2020-hows-your-cybersecurity-57868" rel="nofollow external" class="bo">devices</a> – must become fundamental parts of the product design process, too. And, cybersecurity professionals must use public venues and <a href="https://www.rsaconference.com/events/us17" rel="nofollow external" class="bo">conferences</a> to drive innovative thinking and action that can help fundamentally fix our persistent cybersecurity woes and not simply sell more products and services.</p>
    <h2>Making vulnerability unprofitable</h2>
    <p>Many companies, governments and regular people still don’t follow basic cybersecurity practices that have been <a href="https://www.nist.gov/publications/introduction-computer-security-nist-handbook" rel="nofollow external" class="bo">identified for decades</a>. So it’s not surprising to learn that in 2015, <a href="https://arstechnica.com/information-technology/2015/08/the-nsa-playset-espionage-tools-for-the-rest-of-us/" rel="nofollow external" class="bo">intelligence agencies were exploiting security weaknesses</a> that had been <a href="http://nsarchive2.gwu.edu//dc.html?doc=2800105-Document-01-Defense-Science-Board-Task-Force-on" rel="nofollow external" class="bo">predicted in the 1970s</a>. Presumably, criminal groups and other online attackers were, too.</p>
    <p>Therefore, it’s understandable that commercialism will arise – as both an opportunity and a risk. At present, when cybersecurity problems happen, many companies start offering purported solutions: One industry colleague called this the computer equivalent of “ambulance chasing.” For instance, less than 36 hours after the Equifax breach was made public, the <a href="https://www.bloomberg.com/news/articles/2017-09-13/after-the-equifax-hack-lifelock-sign-ups-jump-tenfold" rel="nofollow external" class="bo">company’s competitors and other firms</a> increased their advertising of security and identity protection services. But those companies <a href="https://www.wired.com/2015/07/lifelock-failed-one-job-protecting-data/" rel="nofollow external" class="bo">may not be secure themselves</a>.</p>
    <p>There are definitely some products and services – like identity theft monitoring – that, when properly implemented, can help provide consumers with reassurance when problems occur. But when companies discover that they can make more money selling to customers whose security is violated rather than spending money to keep data safe, they realize that it’s profitable to remain vulnerable.</p>
    <p>With credit-reporting companies like Equifax, the problem is even more amplified. Consumers didn’t ask for their data to be vacuumed up, but they are faced with bearing the consequences <a href="https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs" rel="nofollow external" class="bo">and the costs</a> now that the data have gotten loose. (And remember, the company has that insurance policy to limit its costs.)</p>
    <p>Government regulators have an important role to play here. Companies like Equifax often <a href="http://www.latimes.com/business/hiltzik/la-fi-hiltzik-equifax-arbitration-20170911-story.html" rel="nofollow external" class="bo">lobby lawmakers</a> to reduce or eliminate requirements for data security and other protections, seek <a href="https://www.networkworld.com/article/2998815/security/cisa-legislation-would-lift-liability-for-businesses-sharing-cyber-threat-information.html" rel="nofollow external" class="bo">to be exempted from liability</a> from potential lawsuits if they minimally comply with the rules and may even try to <a href="http://www.cleveland.com/business/index.ssf/2017/09/equifax_retracts_arbitration_c.html" rel="nofollow external" class="bo">trick consumers</a> into giving up their rights to sue. Proper oversight would protect customers from these corporate harms.</p>
    <h2>Making a commitment</h2>
    <p>I’ve argued in the past that companies and government organizations that <a href="https://www.bloomberg.com/view/articles/2017-09-15/equifax-should-be-a-public-utility" rel="nofollow external" class="bo">hold critical or sensitive information</a> should be willing to <a href="https://theconversation.com/overcoming-cyber-fatigue-requires-users-to-step-up-for-security-70621" rel="nofollow external" class="bo">spend money and staff time</a> to ensure the security and integrity of their data and systems. If they fail, they are really the ones to blame for the incident – not the attackers.</p>
    <p>A National Institute of Standards and Technology researcher exemplified this principle when he recently spoke up to admit that the complex password requirements he helped design years ago <a href="http://wncn.com/2017/08/21/password-creation-guru-regrets-his-advice/" rel="nofollow external" class="bo">don’t actually improve security very much</a>. Put another way, when the situation changes, or new facts emerge, we must be willing to change as necessary with them.</p>
    <p>Many of these problems indeed are preventable. But that’s true only if the cybersecurity industry, and society as a whole, follows the lead of that NIST researcher. We all must take a realistic look at the state of cybersecurity, admit the mistakes that have happened and change our thinking for the better. Only then can anyone – much less everyone – take on the task of devoting time, money and personnel to making the necessary changes for meaningful security improvements. It will take a long time, and will require inconvenience and hard work. But it’s the only way forward.</p>
    <p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article was originally published on <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a>. Read the <a href="https://theconversation.com/equifax-breach-is-a-reminder-of-societys-larger-cybersecurity-problems-84034" rel="nofollow external" class="bo">original article</a>.</p>
    <p></p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/09/equifax-breach-reminder-of-societys-larger-cybersecurity-problems/" rel="nofollow external" class="bo">Equifax breach is a reminder of society’s larger cybersecurity problems</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>There are a lot more holes in cybersecurity fences. iomis/Shutterstock.com Equifax breach is a reminder of society’s larger cybersecurity problems   Richard Forno, University of Maryland,...</Summary>
<Website>https://www.csee.umbc.edu/2017/09/equifax-breach-reminder-of-societys-larger-cybersecurity-problems/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70442/guest@my.umbc.edu/8dc05675389856b2c2fda7e3ff47ff30/api/pixel</TrackingUrl>
<Tag>articles</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 22 Sep 2017 18:47:14 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="70385" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70385">
<Title>Talk: Role of the Defense Information Systems Agency, 12p Fri 9/22</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/09/disa-cyber.jpg" style="max-width: 100%; height: auto;"></p>
    <h3>UMBC Cyber Defense Lab</h3>
    <h1>Tech Talk with the Defense Information Systems Agency (DISA)</h1>
    <h3>James Curry</h3>
    <h4>Lead Engineer – Cyber Security Range<br>
    IDC – Cyber Workforce Development Division<br>
    Defense Information Systems Agency (DISA)</h4>
    <h3>12:00–1:00pm, Friday, 22 September 2017, ITE 228, UMBC</h3>
    <p>A broad reaching brief on some of the technical aspects of DISA’s role as a combat support agency within the Department of Defense. Topics will include Scalability and the challenges of Big Data Analytics, Interoperability of systems, Visualization, Incident Response and Digital Forensics, Challenges with Classification Guidance, Supply Chain Risk Management, and Software Defined Networks/Infrastructure as a Service. Attendees are highly encouraged to ask questions.</p>
    <p>James Curry is DISA’s Lead Engineer for the Cyber Security Range (CSR), which is chartered to develop and host a realistic DoD Information Network (DODIN) environment for Training, Testing, or Exercises. In this position, he has designed and built fully virtual implementations of DISA’s Internet Access Points (IAPs) and its Joint Regional Security Stack (JRSS), enabling the DoD Workforce to train in an IaaS on-demand environment that realistically matches DISA’s core infrastructure. He is a Scholarship for Service (SFS) recipient (2008-2009) and received his Masters and Bachelors of Science in Computer Science from New Mexico Tech. Email: *protected email*</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/09/talk-umbc-defense-information-systems-agency-disa/" rel="nofollow external" class="bo">Talk: Role of the Defense Information Systems Agency, 12p Fri 9/22</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab   Tech Talk with the Defense Information Systems Agency (DISA)   James Curry   Lead Engineer – Cyber Security Range  IDC – Cyber Workforce Development Division  Defense...</Summary>
<Website>https://www.csee.umbc.edu/2017/09/talk-umbc-defense-information-systems-agency-disa/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70385/guest@my.umbc.edu/90105b38b7ce4e1e1beb4e7e77a6e88b/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 21 Sep 2017 12:47:18 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="70320" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70320">
<Title>HackUMBC hackathon, Saturday-Sunday 7-8 October 2017</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/09/hackumbc-1024x536.jpg" style="max-width: 100%; height: auto;"></p>
    <h1>HackUMBC hackathon, Saturday-Sunday 7-8 October 2017</h1>
    <p><a href="http://hackumbc.org/" rel="nofollow external" class="bo">HackUMBC</a> is a 24-hour tech innovation marathon where students across the East Coast collaborate on new ideas to build mobile, web and hardware projects. HackUMBC invites diverse groups of students to enjoy a weekend of hacking, workshops, tech talks, networking, and other fun activities. At the end of 24 hours, projects are presented and judged for different prize categories from sponsors and other organizations.</p>
    <p>The event takes place on Saturday and Sunday, October 7-8 at several locations on the UMBC campus. Visit the <a href="http://hackumbc.org/" rel="nofollow external" class="bo">HackUMBC</a> site for complete details and to register.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/09/hackumbc-umbc-hackathon-october-7-8-2017/" rel="nofollow external" class="bo">HackUMBC hackathon, Saturday-Sunday 7-8 October 2017</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>HackUMBC hackathon, Saturday-Sunday 7-8 October 2017   HackUMBC is a 24-hour tech innovation marathon where students across the East Coast collaborate on new ideas to build mobile, web and...</Summary>
<Website>https://www.csee.umbc.edu/2017/09/hackumbc-umbc-hackathon-october-7-8-2017/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70320/guest@my.umbc.edu/7467a1b33c35ec1833333a9e9e3f17b0/api/pixel</TrackingUrl>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 19 Sep 2017 23:18:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="70275" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/70275">
<Title>IBM recruiting this Wednesday for jobs and internships</Title>
<Tagline>Five recruiting events from 11am to 7pm, all in UC 312</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><p><span>IBM will be on campus this Wednesday, September 20th for an extensive recruiting visit aimed at both undergraduate and graduate students.  There are five different events from 11am to 7pm, all in UC 312   </span></p><strong>IBM HIRING EVENT AT UMBC- Land your Perfect Internship or Job</strong><br><strong>This <span><span>WEDNESDAY, September 20th</span></span>, UC 312</strong><br><span>Be sure to attend one or more of the events below. ~ Bring your resume and stop by when you can. </span><br><br><span>Prepare for your interactions with IBM recruiters, learn more about IBM opportunities </span><a href="http://www-03.ibm.com/employment/us/entry_level_campus.shtml" rel="nofollow external" class="bo">HERE</a><br><br><strong><span><span>11:00 am - 12Noon</span></span>:  Station Conversations</strong><br><span>Rotate and chat with IBM'ers on topics such as Interviewing @ IBM, IBM's Culture, Day in the Life, and Transitioning from College to Career.</span><br><br><strong><span><span>12 Noon - 1:00 pm</span></span>:  Panel discussion with Q &amp; A</strong><br><br><strong><span><span>1:00 - 2:00 pm</span></span>:  Presentation, Careers in Consulting</strong><br><br><strong><span><span>3:00 - 4:00 pm</span></span>:  IBM Research Overview with Radha Ratnaparkhi</strong></div><div><em>Ideal for PhD and Master Degree Candidates, </em><span>International Students are eligible to apply!  </span><span>Join IBM for an overview of the IBM Research Group, led by Radha Ratnaparkhi, Vice President Research Impact.  The Research Group is the innovation engine within IBM, and is one of the world's largest corporate research organization in the world, with 12 labs on six continents. Job opportunities now available!</span><br><br><strong><span><span>5:00 - 7:00 pm</span></span>:  IBM Tech Talk, Emerging Technology Trends in which IBM is a Key Player</strong></div><div><span>Join IBM for a Tech Talk led by RALPH WIEST, Director of Corporate Technology and IBM Distinguished Engineer.  </span><span>Ralph will be discussing emerging technology trends in which IBM is a key player and highlighting how students and early professionals can get started in using these technologies.</span></div></div>
]]>
</Body>
<Summary>IBM will be on campus this Wednesday, September 20th for an extensive recruiting visit aimed at both undergraduate and graduate students.  There are five different events from 11am to 7pm, all in...</Summary>
<Website>http://www-03.ibm.com/employment/us/entry_level_campus.shtml</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/70275/guest@my.umbc.edu/6cda8b6caa7273f3e0f2ba2bd89c23f3/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/070/275/e14267dedd4e1d0cc0093bc13643fd59/xxlarge.jpg?1505787907</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/070/275/e14267dedd4e1d0cc0093bc13643fd59/xlarge.jpg?1505787907</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/070/275/e14267dedd4e1d0cc0093bc13643fd59/large.jpg?1505787907</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/070/275/e14267dedd4e1d0cc0093bc13643fd59/medium.jpg?1505787907</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/070/275/e14267dedd4e1d0cc0093bc13643fd59/small.jpg?1505787907</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/070/275/e14267dedd4e1d0cc0093bc13643fd59/xsmall.jpg?1505787907</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/070/275/e14267dedd4e1d0cc0093bc13643fd59/xxsmall.jpg?1505787907</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 18 Sep 2017 22:26:15 -0400</PostedAt>
<EditAt>Mon, 18 Sep 2017 22:30:29 -0400</EditAt>
</NewsItem>

</News>
