We're all guilty of agreeing to terms and conditions online without actually reading them, but nowadays people are starting to be more careful with their data. Are you among the many who are increasingly concerned about who has access to your data and what it's being used for? Then join us as we explore the science of cyber security.
This event is for ages 21+. Signature drink specials will be available. No food will be available for purchase, but feel free to bring your own or have it delivered directly to Park & Rec!
Geoffrey M. Voelker
Evidence-Based Internet Security
The large-scale compromise of Internet hosts and services forms a platform for supporting a range of cybercrime activity that affects millions of users. In this talk I will present research that our group has performed over the past decade on the problems posed by these threats. In particular, I will describe an "evidence-based" approach to measure, analyze, and undermine various kinds of cybercrime.
Teresa Macklin
What does a CISO do, anyway?
A Chief Information Security Officer is responsible for a wide variety of things. These range from policy through operations through investigating incidents. Your day-to-day work can be very dry and then suddenly turn really urgent. I’m going to focus on some of the interesting situations that come across my desk. I’ll talk about how we investigate incidents, how we try to figure out a new application will turn out badly for us, and then talk about how cybersecurity issues may affect you.