Thank you to all who participated in the 2020 Wisconsin and Minnesota College Cybersecurity Symposium on October 23, 2020!
We wish to extend special thanks to our event co-sponsors: The Tommy G. Thompson Center on Public Leadership at the University of Wisconsin Madison, and the U.S. Department of Defense. Here are the links to the 2020 Wisconsin and Minnesota College Cybersecurity Symposium Agenda and Speakers & Panelists who presented on October 23, 2020.
Mark your calendar for the next Cybersecurity Research and Outreach Center (CyROC) online event!
IoT Security & Privacy Workshop
April 23, 2021
The Thompson Center and UW-Stout Cybersecurity Research & Outreach Center (CyROC) are pleased to host a virtual conference on the challenges and opportunities of COVID-19 tracking apps as pandemic control mechanisms.
10:30 a.m. - 12:30 p.m. CST: This conference begins with a panel of public health, policy and legal experts who will discuss the growing role of COVID-19 tracking apps to monitor levels of infection as a means of pandemic controls.
12:45 p.m. - 3:30 p.m. CST: Following the panel discussion, participants will be invited to attend a hands-on workshop provided by UW-Stout CyROC that will explore how the growth of these cloud-based technologies presents new opportunities and threats when it comes to information security.
3:30 p.m. - 4:00p.m. CST: Closing ceremony/virtual social activity.
Agenda
10:30 am – 12:30 pm | A Live Panel Discussion The Opportunities & Challenges of COVID-19 Tracking Apps as Pandemic Control Mechanisms This webinar is free and open to the public. |
12:45 pm – 3:30 pm | IoT Cloud Security Hands-on Workshop Description: Internet of Things (IoT) and Internet of Everything (IoE) are commonly referred to have small and always-connected devices sending data to backend cloud-based applications. By 2025, there will be more than 25 billion IoT devices in the world. It’s a vast opportunity but it also brings vast risk. More connected devices mean more attack vectors and more possibilities for attackers to infiltrate systems, exfiltrate sensitive data and disrupt potentially critical systems. IoT security has now become an issue of high concern, even at the federal government level. In this hands-on workshop, we will provide step-by-step guide how to build trust (trusted identities, trusted data, trusted connectivity, and privacy and confidentiality) in IoT. Please sign-up for this event using the registration link below. |
3:30 pm – 4:00 pm | Closing ceremony Social Networking, Center of Academic Excellence in Cyber Defense Education (CAE-CDE) application, Transfer Agreement |