Monday, August 17, 2015

A time to eat, drink & talk about science!

Celebrating 4 Years of Science on Tap!


Join us 

Science on Tap Series
Thursday, September 3, 2015
5:30 pm - 6:30 pm

Yanni's
 
3109 Central Avenue NE
(505) 268-9250


Cyber Security


Debbie Kuidis
Facility Security Officer, the University of New Mexico

Adelicia Gunn
Program Specialist in Export Control, the University of New Mexico 

“There are two kinds of people in America today: those who have experienced a cyber-attack and know it, and those who have experienced a cyber-attack and don't know it” –Frank Wolf
 WHICH ONE ARE YOU?

As the world becomes increasingly interconnected through multiple cyber interfaces, the importance of strong cybersecurity practices is of great importance in order to deter and effectively minimize attacks. Globalization as enhanced through cyber mediums such as facebook, periscope, twitter, and the use of the world wide web helps to connect us with people, organizations, and regions whom we otherwise would never connect with. This technological advancement has both positive and negative consequences.
For most, this interconnectivity helps us interact with others and learn about the world in a meaningful way. However, for others, they exploit vulnerable networks and employ malicious attacks with the intention to stealing personal identities and research.  
This presentation will help you to identify contemporary threats to information within the United States and when you are traveling abroad in order to help you develop a broad understanding of the regulatory frameworks that have jurisdiction over scientific research and its protection, and teach you specific behaviors that help protect yourself from becoming a victim of a cybercrime.

Topics Covered:
-          Contemporary threats to information and information security
-          Good behaviors that protect the University’s and your own information
-          Protection of sensitive, export controlled, and classified information
-          Social Engineering
-          Social media
-          Passwords
-          Physical and Mobile Security
-          Email phishing
-          Malware
-          Confidentiality on the Internet


No comments:

Post a Comment