Robert Mitchell, a member of the technical staff at Sandia National Laboratories, will deliver a talk titled “Recent Cybersecurity Events and Future Research Directions,” about the critical research needed to mount effective defense against complex cyber attacks. The talk will occur from 1:30 to 3 p.m. on April 19 in 134 HUB-Robeson Center.
Gerry Santoro, senior lecturer in information sciences and technology (IST) and assistant professor of communications arts and sciences, will be presenting a lecture on strategies to protect your online identity.
The security risks and dangers posed by advancing smart and cloud-based technologies and how consumers can best protect themselves will be discussed by cybersecurity and technology experts during the next episode of WPSU Penn State’s “Digging Deeper.” The show will premiere at 11:30 a.m. Dec. 4 on WPSU-TV.
The National Science Foundation has recognized Pennsylvania College of Technology’s commitment to tomorrow’s workforce by awarding the institution a grant intended to bolster the pipeline of information assurance/cyber defense professionals.
Andrew Sears, interim chief information security officer and dean of the College of Information Sciences and Technology, recently participated in a Q&A to discuss the mission of the Office of Information Security; how students, faculty and staff members can keep personal and institutional information secure; and what lies ahead for the future of cybersecurity at Penn State.
Penn State’s Competitive Cyber Security Organization, a collection of students from the College of Information Sciences and Technology, has advanced to the finals of the National Cyber Analyst Challenge, set for Oct. 27-28 in Reston, Virginia. The competition identifies the best students pursuing cyber-related degrees in the country through a three-phased interdisciplinary competition.
The members of the Penn State Competitive Cyber Security Organization come together to practice for and compete in cybersecurity competitions, as well as listen to speakers and brush up on other computing skills.
Authors are invited to submit abstracts addressing the policy and legal aspects of information security, privacy, data protection, cybersecurity-related legislation and critical cyber-infrastructure protection for a Penn State workshop on cybersecurity law and policy scheduled for this fall in Washington, D.C.
Amid studying for exams and completing coursework to wrap up the fall semester, students from the College of Information Sciences and Technology (IST) at Penn State faced off against cyber challengers from around the country to garner an outstanding sixth-place finish among 129 teams that took part in the weeklong National Cyber League competition finals held in December.
Energy is essential to home, community, commercial and government operations, and any disruption in the flow of energy could lead to life or death situations. How energy deliveries are protected from unauthorized disruptions will be the topic of a Web-based seminar offered by Penn State Extension.
This fall, five students from the College of Information Sciences and Technology are competing in the National Cyber Analyst Challenge, a three-phase competition designed to support and inspire students from the nation’s top cyber programs.
As part of ongoing efforts to fortify Penn State’s network infrastructure, data and people from potential cyberattack, Penn State has announced the establishment of a new Office of Information Security.
A letter from President Eric Barron addressing the University community on Penn State's response to cyberattacks on the College of Engineering.
Amidst raising 10 children as well as serving a military deployment in Afghanistan, Jim Terwilliger obtained a master’s degree in cybersecurity from Penn State’s World Campus. It might have taken considerable dedication and a great deal of flexibility but, Terwilliger said, “I’m glad I did it, and I would do it again.”
Someday, a military commander will look over a battlefield map to check the position of troops, tanks, artillery emplacements and the enemy, considering every contingency in the complex mission. Then the commander will glance at a monitor that shows the status of the electronic environment -- communications frequencies, computer program security, hacker attacks and the responses to those attacks -- and determine which digital threats require human intervention.