CRA-WPIncreasing the success and participation of women in computing research.
  • Facebook
  • Twitter
  • Linkedin
  • About
    • Mission
    • History
    • Co-Chairs
    • Board
    • Staff
    • CRA-W Sponsors
    • Support CRA-W
      • Donate
      • Why we need you!
      • Become a Sponsor
      • Volunteer
    • Broadening Participation Alliance
    • CRA-W Projects
  • Programs
    • Programs for Undergraduate Students
    • Programs For Graduate Students
    • Programs for Faculty
    • Programs for Industry and Government Researchers
    • CRA-W Projects
  • Scholarships & Awards
    • Awards
      • Borg Early Career Award
    • Scholarships
      • GHC Research Scholars
      • SWSIS
      • Resources
        • Resource Library
        • Evaluation
          • Center for Evaluating the Research Pipeline
          • CRA-W Program Infographics
        • Related Organizations
        • Mailing Lists
        • Career Opportunities
        • Education Committee
        • Newsletter & Articles
          • Newsletter Articles
          • Articles
          • Expanding the Pipeline Column
          • CRA Reports
    • RECOGnizing Notable Women
  • Resources
    • Resource Library
    • Evaluation
      • Center for Evaluating the Research Pipeline
      • CRA-W Program Infographics
    • Related Organizations
    • Mailing Lists
    • Career Opportunities
    • Education Committee
    • Sexual Harassment
    • Newsletter & Articles
      • Newsletter Articles
      • Articles
      • Expanding the Pipeline Column
      • CRA Reports
  • Quick Links
    • DREU
    • CREU
    • Undergraduate Town Hall
    • Grad Cohort
    • Mentoring Tracks
      • Mentoring at Tapia
      • Mentoring at Grace Hopper
    • Early – CMW
    • Mid – CMW
    • DSW
    • DLS
    • BECA
    • SWSIS
  • Sign up for emails
  • Donate!
  • Search
  • Menu
  • CRA-W Updates
  • Mission
  • History
  • Co-Chairs
  • Board
    • Associate Members
    • Past CRA-W Board Members
    • In Memoriam
  • Staff
  • Broadening Participation Alliance
  • CRA-W Projects

5th National Women in Cybersecurity Conference (WiCyS)


March 23-24, 2018

Hilton, Chicago, Downtown
720 South Michigan Avenue, Chicago, IL 60605, United States



Event Contact

Dr. Ambareen Siraj
asiraj@tntech.edu


Event Type

DLS


Event Category

CRA-W


Tags

Distinguished Lecture Series, DLS, WiCyS 2018, Women in Cybersecurity Conference

Overview

CRA-W Distinguished Lecture Series is proud to support the upcoming WiCyS

What is WiCyS?

WiCyS (Women in CyberSecurity) is a community of engagement, encouragement and support for women in cybersecurity. Since 2013, with support from various industry, government and academic partners, WiCyS has become a continuing effort to recruit, retain and advance women in cybersecurity. It brings together women (students/faculty/researchers/professionals) in cybersecurity from academia, research and industry for sharing of knowledge/experience, networking and mentoring.

 

What will happen at WiCyS?

Through the WiCyS community and activities we expect to raise awareness about the importance and nature of cybersecurity career. We hope to generate interest among students to consider cybersecurity as a viable and promising career option.

 

For More Information
 

Speakers

Speakers

Susan Landau, Tufts University

Susan Landau is Bridge Professor in the Fletcher School of Law and Diplomacy and the School of Engineering, Department of Computer Science, Tufts University and Visiting Professor of Computer Science, University College London. Landau works at the intersection of cybersecurity, national security, law, and policy. Landau has been a Senior Staff Privacy Analyst at Google, a Distinguished Engineer at Sun Microsystems, and a faculty member at Worcester Polytechnic Institute, the University of Massachusetts Amherst and Wesleyan University. She is a member of the Cybersecurity Hall of Fame, a fellow of the American Association for the Advancement of Science and of the Association for Computing Machinery. Her new book, “Listening In: Cybersecurity in an Insecure Age,” was published by Yale University Press.

Listening In: Cybersecurity in an Insecure Age

What makes us most secure? Is it enabling the police and intelligence agencies to unlock digital devices and listen to communications? Or is it securely protecting devices and communications against intrusions? Two events in 2016 painted this issue in sharp contrast. In February 2016, the FBI tried to compel Apple to open the locked iPhone of a San Bernardino terrorist. Apple refused, citing threats to iPhone security. Eventually the phone was unlocked without Apple’s help; the battle over encryption continued. Then, in October 2016, the US government announced that Russia had interfered with the 2016 presidential campaign, attacking not only the Democratic National Committee and the Clinton campaign, but also research institutions and civil society organizations. Nor was the US the only target of Russian government attacks; the 2016 French presidential election was similarly targeted.  What makes us most secure? In this talk, I will discuss our most serious threats and what’s needed to protect against them.

 

Celeste Matarazzo, Lawrence Livermore Laboratory

Celeste Matarazzo is a data science expert with more than 30 years of service to the Lawrence Livermore National Laboratory. Celeste is the Principal Investigator for a large LLNL funded strategic initiative research project in cyber security situational awareness. As a cyber security researcher, she is working with national laboratory, industrial and academic partners to develop game-changing tools and techniques to enhance security in a networked world. She is also the program manager for LLNL’s Cyber Defenders Summer Intern Program. Celeste previously held numerous technical and leadership roles throughout her career at LLNL focusing on the application of data science to address global security issues. Celeste has a B.S. in Mathematics and Computer Science from Adelphi University and pursued her graduate studies at the University of Wisconsin-Madison. She is an avid bicyclist who achieved a long-time goal in 2005 when she completed a 3,850-mile transcontinental bicycle journey from San Francisco to Virginia Beach raising money for Hope Hospice.

Cyber Security Research: A Data Scientist’s Perspective

As all aspects of our lives become increasingly dependent on computing networks and the Internet, cyber security has grown from a localized economic problem to a major national imperative. Situational awareness of computer networks presents many challenges including but not limited to the volume of the data and the dynamic and evolving nature of the problem space. For example, at the perimeter of a corporate enterprise computer network, it is common to see terabytes of network traffic each day, containing millions of unique IP addresses and connection records that number in the hundreds of millions. Celeste will provide an overview and discuss recent trends facing computer security researchers and practitioners. She will describe recent work at Lawrence Livermore National Laboratory to enable analysis of computer networks. Characterizing network-wide activity depends critically on understanding time-varying patterns of system behaviors, such as the actions and connections between components.  This approach makes use of state of the art data collection, building and accessing large-scale graph representations, and new capabilities and advances in data science and machine learning.

Participants

Once WiCyS accommodates all student scholarship and faculty accommodation award recipients, program presenters, sponsoring partners’ delegates, ALL other registrations (except students) will open on January 15 and close on February 15, 2018 OR at capacity (whichever comes first).

 

CRA - Uniting Industry, Academia and Government to Advance Computing Research and Change the World.
CCC - Catalyzing the computing research community and enabling the pursuit of innovative, high-impact research.
CRA-W - Increasing the success and participation of women in computing research.
CRA-E - Addressing society’s need for a continuous supply of talented and well-educated computing researchers.
CERP - Promoting diversity in computing through evaluation and research.
CRA Home | Contact Us | Unsubscribe/Removal of Information | Terms of Use         © Copyright 2019 - CRA
Virtual Undergrad Town Hall: Using Machine Learning for Network Capacity Ma... Broadening Participation in Visualization (BPViZ 18)
Scroll to top