wicys 2014 April 11, 2014 to April 12, 2014, Nashville,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Security Competition Student Workshop Jason M. Pittman N/A
Secure Coding Faculty Workshop Elizabeth Hawthorne N/A
Resume Clinic Don Foster N/A
Welcome Remarks Joseph Rencis N/A
Opening Remarks Ernest Mcduffie , Valerie Barr N/A
Keynote Deborah Frincke , Michele Cantley Follow Your Heart While Using Your Head: The talk will build on the speaker’s personal ...
Consumer privacy protection on mobile devices: Jaeyeon Jung The talk will discuss limitations of the current mobile ecosystem that permitted “unexpected use” of ...
Disrupt! Diana L. Burley The complex cybersecurity environment requires actions and voices that disrupt accepted thought patterns and challenge ...
Cyberjutsu Lisa Foreman The Art of Cyber: Founder & CEO of the Women’ Society Cyberjutsu, shares her journey ...
Efficient, Privacy-Preserving Data Sharing Emily Shen Modern cryptography provides several different types of tools that offer the promise of searching on ...
Redefining Cybersecurity Competitions to Increase Female Participation Diane Murphy , Michelle Liu One of the first exposures to cybersecurity for young people is often the cybersecurity competition, ...
Women in Cybersecurity Robin Williams Opportunity is Knocking: This presentation focuses on national effort to raise the bar of cybersecurity ...
Graduate School Panel Jaeyeon Jung , Ronda Henning , Diana L. Burley , Lisa Duge , Susanne Wetzel A graduate school panel would be a great way for undergraduate students or professionals seeking ...
Obtaining Funding for Cyber Security Initiatives Terry Benzel , Li Yang , Valerie Barr , Sharon Burlingame , David Dampier Panelists who have written successful grants will share their insights, success stories, challenges, opportunities, and ...
How Did I Get Here Dawn Beyer , Eleni Gessiou , Linda Ciulla , Kelley Misata , Perri Nejib My Struggles and Triumphs: Technical women across cybersecurity industry will share experiences and thoughts on ...
Is Cybersecurity different from Computer Science with regard to Recruiting and Retaining Women and Minorities in the field? Rebecca Bace , Rose Shumba , Corrinne Sande , Carol Taylor This BoF session will discuss whether Cybersecurity is indeed substantially different from Computer Science (CS) ...
Enhancing Classroom Learning About Security with other Opportunities Barbara Hewitt This discussion will stem around the mechanisms that instructors can use to enhance the delivery ...
Information Security Career Trends Caroline Dennis , Career Catalyst What’s Hot and Where do You Fit?: This discussion will kick off with a broad ...
2fac authentication + your organization Kieu Lam Will present how Facebook implemented 2fac authentication using the latest technologies with the least amount ...
Networking for the Introverted Dawn Carroll Will focus on ways to get out of introvert shell and push oneself into unfamiliar ...
CyberEagles Vitaly Ford , Melaina Myers A cybersecurity club for students: Will present the benefits and mechansims of inititaing and sustaining ...
Pathways in Cybersecurity between 2-Year and 4-Year Institutions Susanne Wetzel Will present the pilot study between Union County College and Stevens Institute of Technology to ...
Data, Unprotected Dawn Isabel How mobile applications betrayed my trust: Will present the results of analyzing personal smartphone for ...
Continuing Education Dale Rowe Will present continuing education opportunities for women focusing on Graduate studies and Certifications. Based on ...
Digital Forensics and Cyber Security Suzanne Mello-stark Will present Digital Forensics and Cyber Security Programs overview, differences, opportunities and example in University ...
Scholarships for Women Studying Information Security (SWSIS) Jeremy Epstein SWSIS offers various scholarships for women studying any aspect of information security at an undergraduate ...
Strategies for Research in Computer Security Jeanna N. Mathews The talk will discuss strategies for finding important and inspiring cybersecurity problems that you are ...
Through the tangle of cyber education Cynthia E. Irvine Is learning cyber security a sentence to life in the cyber dungeon as a boring ...
Leading a Security Team Merisa Viveros Challenges and Rewards: This presentation describes the challenges that security leaders must face in an ...
Formal Models and Verification of Software Systems Limin Jia Formal verification of system properties is crucial to the security of software systems. Combining the ...
Industry Resources for Universities for Supporting Cyber Security Education Dianne Fodell This presentation demonstrates how industry, particularly IBM and Intel can assist university faculty in developing ...
Application Security Lora Mcintosh (White Hat) Hacking for a Living Popular culture would have us believe that the only ...
NCWIT TN Aspiration Awards Ruthe Farmer , Martha Kosa N/A