wicys 2014 April 11, 2014 to April 12, 2014, Nashville,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Security Competition Student Workshop | Jason M. Pittman | N/A | |
Secure Coding Faculty Workshop | Elizabeth Hawthorne | N/A | |
Resume Clinic | Don Foster | N/A | |
Welcome Remarks | Joseph Rencis | N/A | |
Opening Remarks | Valerie Barr , Ernest Mcduffie | N/A | |
Keynote | Deborah Frincke , Michele Cantley | Follow Your Heart While Using Your Head: The talk will build on the speaker’s personal ... | |
Consumer privacy protection on mobile devices: | Jaeyeon Jung | The talk will discuss limitations of the current mobile ecosystem that permitted “unexpected use” of ... | |
Disrupt! | Diana L. Burley | The complex cybersecurity environment requires actions and voices that disrupt accepted thought patterns and challenge ... | |
Cyberjutsu | Lisa Foreman | The Art of Cyber: Founder & CEO of the Women’ Society Cyberjutsu, shares her journey ... | |
Efficient, Privacy-Preserving Data Sharing | Emily Shen | Modern cryptography provides several different types of tools that offer the promise of searching on ... | |
Redefining Cybersecurity Competitions to Increase Female Participation | Diane Murphy , Michelle Liu | One of the first exposures to cybersecurity for young people is often the cybersecurity competition, ... | |
Women in Cybersecurity | Robin Williams | Opportunity is Knocking: This presentation focuses on national effort to raise the bar of cybersecurity ... | |
Graduate School Panel | Jaeyeon Jung , Ronda Henning , Diana L. Burley , Lisa Duge , Susanne Wetzel | A graduate school panel would be a great way for undergraduate students or professionals seeking ... | |
Obtaining Funding for Cyber Security Initiatives | Terry Benzel , Li Yang , Valerie Barr , Sharon Burlingame , David Dampier | Panelists who have written successful grants will share their insights, success stories, challenges, opportunities, and ... | |
How Did I Get Here | Dawn Beyer , Eleni Gessiou , Linda Ciulla , Kelley Misata , Perri Nejib | My Struggles and Triumphs: Technical women across cybersecurity industry will share experiences and thoughts on ... | |
Is Cybersecurity different from Computer Science with regard to Recruiting and Retaining Women and Minorities in the field? | Rebecca Bace , Rose Shumba , Corrinne Sande , Carol Taylor | This BoF session will discuss whether Cybersecurity is indeed substantially different from Computer Science (CS) ... | |
Enhancing Classroom Learning About Security with other Opportunities | Barbara Hewitt | This discussion will stem around the mechanisms that instructors can use to enhance the delivery ... | |
Information Security Career Trends | Caroline Dennis , Career Catalyst | What’s Hot and Where do You Fit?: This discussion will kick off with a broad ... | |
2fac authentication + your organization | Kieu Lam | Will present how Facebook implemented 2fac authentication using the latest technologies with the least amount ... | |
Networking for the Introverted | Dawn Carroll | Will focus on ways to get out of introvert shell and push oneself into unfamiliar ... | |
CyberEagles | Vitaly Ford , Melaina Myers | A cybersecurity club for students: Will present the benefits and mechansims of inititaing and sustaining ... | |
Pathways in Cybersecurity between 2-Year and 4-Year Institutions | Susanne Wetzel | Will present the pilot study between Union County College and Stevens Institute of Technology to ... | |
Data, Unprotected | Dawn Isabel | How mobile applications betrayed my trust: Will present the results of analyzing personal smartphone for ... | |
Continuing Education | Dale Rowe | Will present continuing education opportunities for women focusing on Graduate studies and Certifications. Based on ... | |
Digital Forensics and Cyber Security | Suzanne Mello-stark | Will present Digital Forensics and Cyber Security Programs overview, differences, opportunities and example in University ... | |
Scholarships for Women Studying Information Security (SWSIS) | Jeremy Epstein | SWSIS offers various scholarships for women studying any aspect of information security at an undergraduate ... | |
Strategies for Research in Computer Security | Jeanna N. Mathews | The talk will discuss strategies for finding important and inspiring cybersecurity problems that you are ... | |
Through the tangle of cyber education | Cynthia E. Irvine | Is learning cyber security a sentence to life in the cyber dungeon as a boring ... | |
Leading a Security Team | Merisa Viveros | Challenges and Rewards: This presentation describes the challenges that security leaders must face in an ... | |
Formal Models and Verification of Software Systems | Limin Jia | Formal verification of system properties is crucial to the security of software systems. Combining the ... | |
Industry Resources for Universities for Supporting Cyber Security Education | Dianne Fodell | This presentation demonstrates how industry, particularly IBM and Intel can assist university faculty in developing ... | |
Application Security | Lora Mcintosh | (White Hat) Hacking for a Living Popular culture would have us believe that the only ... | |
NCWIT TN Aspiration Awards | Martha Kosa , Ruthe Farmer | N/A |