This document outlines the agenda for a cybersecurity innovation workshop hosted by MIT. The agenda includes introductory remarks and keynote speeches from industry leaders on trends in cybersecurity, investment, and policy. There will also be lightning talks from startup founders and executives. The workshop will conclude with a panel discussion on important trends in cybersecurity innovation, the ecosystem, corporate priorities, and investment focus areas. The panel will be moderated by the Executive Director of Cybersecurity@CSAIL at MIT.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. MIT Startup Exchange
"Cybersecurity investment trends" Chris Lynch, Partner, Atlas Ventures. Cybersecurity Innovation (5/28), MIT Startup Exchange (STEX), Thursday May 28, 2015, 8:30 AM to 11:30 AM, at One Main Street, Cambridge, MA.
The challenges of building a strong data infrastructureJeni Tennison
In the 21st century, data is infrastructure for our economy, just like roads. In this session, Jeni will talk about the big challenges of building a strong data infrastructure: challenges of equality of access, challenges of privacy and trust, and the technical challenges of discovery and interoperability.
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Black Duck by Synopsys
A grab-bag of open source security and cybersecurity news is in this week’s edition of Open Source Insight. Is “many eyeballs” not enough? Some security researchers think Linus’ Law doesn’t work anymore. Black Duck by Synopsys kicks off a new video series with MITRE IoT expert, Bob Martin. Learn how open source tech due diligence helped one company close a deal securely. Should “Privacy Day” be renamed to “Lack of Privacy” day? Plus, an eye-catching infographic on how too little software security training is putting many companies at risk.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. MIT Startup Exchange
"Cybersecurity investment trends" Chris Lynch, Partner, Atlas Ventures. Cybersecurity Innovation (5/28), MIT Startup Exchange (STEX), Thursday May 28, 2015, 8:30 AM to 11:30 AM, at One Main Street, Cambridge, MA.
The challenges of building a strong data infrastructureJeni Tennison
In the 21st century, data is infrastructure for our economy, just like roads. In this session, Jeni will talk about the big challenges of building a strong data infrastructure: challenges of equality of access, challenges of privacy and trust, and the technical challenges of discovery and interoperability.
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Black Duck by Synopsys
A grab-bag of open source security and cybersecurity news is in this week’s edition of Open Source Insight. Is “many eyeballs” not enough? Some security researchers think Linus’ Law doesn’t work anymore. Black Duck by Synopsys kicks off a new video series with MITRE IoT expert, Bob Martin. Learn how open source tech due diligence helped one company close a deal securely. Should “Privacy Day” be renamed to “Lack of Privacy” day? Plus, an eye-catching infographic on how too little software security training is putting many companies at risk.
Webinar - How to Become a Cyber-threat Intelligence AnalystTuan Yang
The U.S. Bureau of Labor Statistics projects that employment in Information Security will grow 32% from 2019 to 2028, which is swifter than the average for all professions.
Cyber-threat Intelligence is a crucial part of the cybersecurity dilemma. Threat Intelligence Analysts are experts capable of fortifying the security system of an organization and doing everything needed to protect their system and network before a cyber-attack can harm them.
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
60 minute lecture to Harvard GSD Exec. Edu Leading Organizations course. February 5th. Boston. MA.
Trends in technology. Smart Cities. Impact on business, infrastructure, and real estate. What it takes to manage this change. Our role and participation in the journey of City transformation.
Too often do professionals focus on individual social or digital media platforms/products - how to effectively use Twitter, or set up a Linkedin profile, etc. This presentation is a step back, attempting to give a simple, big picture overview of the online ecosystem and the major trends defining it.
Over the past few years, we have seen that the amount of user data is being compromised. As the Internet of Things (IoT) and widespread Internet usage have caught on, cybercrime has grown rapidly. This not only compromises consumers but also damages the reputation of companies.
Close the Security Gaps of a Remote Workforcejlieberman07
The Covid-19 pandemic demanded that businesses immediately shift to remote work environments. The quick shift however, may have created security gaps. Cyber security experts and IT executives steps companies should take to ensure secure access to sensitive corporate data when enabling employees to work from home.
Let us help you stand up a secure remote work environments in 24 hours! https://bit.ly/2ScpL22
Extracting maximum value from data while protecting consumer privacy. Jason ...huguk
Big organisations have a wealth of rich customer data which opens up huge new opportunities. However, they have the challenge of how to extract value from this data while protecting the privacy of their individual customers. He will talk about the risks organisations face, and what they should do about it. He will survey the techniques which can be used to make data safe for analysis, and talk briefly about how they are solving this problem at Privitar.
[Webinar Slides] Workflow and Process Security Checking the LocksAIIM International
How do you ‘check the locks’ of your data security? It all starts with shoring up your processes and workflows. In these webinar slides we outline tips and tricks for managing your documents as they enter into and within your workflows – with security in mind.
Want to follow along with the webinar replay? Download it here for free: http://info.aiim.org/workflow-and-process-security
IT Security In 2016: Hull
14.30 - 16.00. Thurs 28th April @ Allia Future Business Centre, Peterborough
Slide deck taken from the Will Your Business Get Hacked? business breakfast seminar on Thursday 28th April at Allia Future Business Centre, London Road, Peterborough.
Speakers:
Phil Denham - Commercial Director @ Kamarin Computers
James Burchell - Senior Sales Engineer @ Sophos
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology UniversityTopCyberNewsMAGAZINE
Dr. Bradford L. Sims became Capitol Technology University's eighth president on June 1, 2017. An educator, administrator and construction project manager, Dr. Sims has extensive experience both in academia and industry.
Dr. Sims earned a Ph.D. in Curriculum and Instruction in 1999 from Purdue University, which is also his undergraduate alma mater; he received his B.S. in Building Construction Management there in 1990. He also holds a master's of science degree in Building Construction from the University of Florida. He is a member of the Sigma Lambda Chi International Construction Honor Society and the American Institute of Contractors, among many other honors and professional affiliations.
The Education Magazine has selected Dr. Bradford Sims one of the 10 Most Influential Educational Leaders of 2021. He leads Capitol Technology University with an education laser-focused on STEM or Management of STEM careers which uniquely positions students for top roles in the region's booming tech hub.
‘The education of the next generation of Cyber experts must start now’, include all those that have historically been limited to be part of this defence of our ways of life. ~ Dr. Ian McAndrew
Focused on STEM since its inception in 1927, Capitol Technology University has developed a robust, practical, and award-winning cybersecurity program for students at all levels to learn the skills necessary to become industry Leaders.
Capitol Tech, located in Laurel, Maryland, is home to nationally recognized cybersecurity degrees, with SC Media naming the university’s cybersecurity program as the 2020 Best Cybersecurity Program and the Chair of Cybersecurity, Dr. Willliam (Bill) Butler, as the 2021 Outstanding Educator.
Since 2003, the Department of Homeland Security (DHS) and the National Security Agency (NSA) also recognized the program as a Center of Academic
Excellence in Cyber-Defense, and in 2021 the university was selected by the NSA as the Northeast region’s Cybersecurity Hub. As the Hub, the university will mentor hundreds of institutions offering cybersecurity programs across 14 states and the District of Columbia to develop or enhance their cybersecurity programs.
This new title allows Capitol Tech to continue mentoring other universities in cyber program creation in addition to opportunities the preexisting CAE designation afforded the university. These include being selected by the NSA to supplement their development program for new security engineers with master’s courses, by over twenty Cyber Scholarship Program (CySP) scholars, and by the National Science Foundation (NSF) for two major multi-year grants to address the shortage of cybersecurity professionals.
Capitol Tech’s cybersecurity bachelor’s, master’s, and doctoral students are immersed in a hands-on education led by industry experts to learn in-demand skills. Undergraduate students learn UNIX O/S, C programming, networking, virtual machines, vulnerability scanning, packet capture and analysis,
2014 Tech M&A Monthly - Deals Closing GloballyCorum Group
Bolstered by strong public markets, record cash and continuing disruptive technological change, the high volume of Tech M&A deals has carried over into the first quarter of 2014, making for a record spring. Tune in to our Quarterly Report April 10 for field reports from the dealmakers in the M&A trenches on deals closing globally.
Plus, details on the key deals, trends and valuations in the Horizontal, Vertical, Consumer, Internet, Infrastructure and IT Services markets for Q1:2014.
Webinar - How to Become a Cyber-threat Intelligence AnalystTuan Yang
The U.S. Bureau of Labor Statistics projects that employment in Information Security will grow 32% from 2019 to 2028, which is swifter than the average for all professions.
Cyber-threat Intelligence is a crucial part of the cybersecurity dilemma. Threat Intelligence Analysts are experts capable of fortifying the security system of an organization and doing everything needed to protect their system and network before a cyber-attack can harm them.
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
60 minute lecture to Harvard GSD Exec. Edu Leading Organizations course. February 5th. Boston. MA.
Trends in technology. Smart Cities. Impact on business, infrastructure, and real estate. What it takes to manage this change. Our role and participation in the journey of City transformation.
Too often do professionals focus on individual social or digital media platforms/products - how to effectively use Twitter, or set up a Linkedin profile, etc. This presentation is a step back, attempting to give a simple, big picture overview of the online ecosystem and the major trends defining it.
Over the past few years, we have seen that the amount of user data is being compromised. As the Internet of Things (IoT) and widespread Internet usage have caught on, cybercrime has grown rapidly. This not only compromises consumers but also damages the reputation of companies.
Close the Security Gaps of a Remote Workforcejlieberman07
The Covid-19 pandemic demanded that businesses immediately shift to remote work environments. The quick shift however, may have created security gaps. Cyber security experts and IT executives steps companies should take to ensure secure access to sensitive corporate data when enabling employees to work from home.
Let us help you stand up a secure remote work environments in 24 hours! https://bit.ly/2ScpL22
Extracting maximum value from data while protecting consumer privacy. Jason ...huguk
Big organisations have a wealth of rich customer data which opens up huge new opportunities. However, they have the challenge of how to extract value from this data while protecting the privacy of their individual customers. He will talk about the risks organisations face, and what they should do about it. He will survey the techniques which can be used to make data safe for analysis, and talk briefly about how they are solving this problem at Privitar.
[Webinar Slides] Workflow and Process Security Checking the LocksAIIM International
How do you ‘check the locks’ of your data security? It all starts with shoring up your processes and workflows. In these webinar slides we outline tips and tricks for managing your documents as they enter into and within your workflows – with security in mind.
Want to follow along with the webinar replay? Download it here for free: http://info.aiim.org/workflow-and-process-security
IT Security In 2016: Hull
14.30 - 16.00. Thurs 28th April @ Allia Future Business Centre, Peterborough
Slide deck taken from the Will Your Business Get Hacked? business breakfast seminar on Thursday 28th April at Allia Future Business Centre, London Road, Peterborough.
Speakers:
Phil Denham - Commercial Director @ Kamarin Computers
James Burchell - Senior Sales Engineer @ Sophos
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology UniversityTopCyberNewsMAGAZINE
Dr. Bradford L. Sims became Capitol Technology University's eighth president on June 1, 2017. An educator, administrator and construction project manager, Dr. Sims has extensive experience both in academia and industry.
Dr. Sims earned a Ph.D. in Curriculum and Instruction in 1999 from Purdue University, which is also his undergraduate alma mater; he received his B.S. in Building Construction Management there in 1990. He also holds a master's of science degree in Building Construction from the University of Florida. He is a member of the Sigma Lambda Chi International Construction Honor Society and the American Institute of Contractors, among many other honors and professional affiliations.
The Education Magazine has selected Dr. Bradford Sims one of the 10 Most Influential Educational Leaders of 2021. He leads Capitol Technology University with an education laser-focused on STEM or Management of STEM careers which uniquely positions students for top roles in the region's booming tech hub.
‘The education of the next generation of Cyber experts must start now’, include all those that have historically been limited to be part of this defence of our ways of life. ~ Dr. Ian McAndrew
Focused on STEM since its inception in 1927, Capitol Technology University has developed a robust, practical, and award-winning cybersecurity program for students at all levels to learn the skills necessary to become industry Leaders.
Capitol Tech, located in Laurel, Maryland, is home to nationally recognized cybersecurity degrees, with SC Media naming the university’s cybersecurity program as the 2020 Best Cybersecurity Program and the Chair of Cybersecurity, Dr. Willliam (Bill) Butler, as the 2021 Outstanding Educator.
Since 2003, the Department of Homeland Security (DHS) and the National Security Agency (NSA) also recognized the program as a Center of Academic
Excellence in Cyber-Defense, and in 2021 the university was selected by the NSA as the Northeast region’s Cybersecurity Hub. As the Hub, the university will mentor hundreds of institutions offering cybersecurity programs across 14 states and the District of Columbia to develop or enhance their cybersecurity programs.
This new title allows Capitol Tech to continue mentoring other universities in cyber program creation in addition to opportunities the preexisting CAE designation afforded the university. These include being selected by the NSA to supplement their development program for new security engineers with master’s courses, by over twenty Cyber Scholarship Program (CySP) scholars, and by the National Science Foundation (NSF) for two major multi-year grants to address the shortage of cybersecurity professionals.
Capitol Tech’s cybersecurity bachelor’s, master’s, and doctoral students are immersed in a hands-on education led by industry experts to learn in-demand skills. Undergraduate students learn UNIX O/S, C programming, networking, virtual machines, vulnerability scanning, packet capture and analysis,
2014 Tech M&A Monthly - Deals Closing GloballyCorum Group
Bolstered by strong public markets, record cash and continuing disruptive technological change, the high volume of Tech M&A deals has carried over into the first quarter of 2014, making for a record spring. Tune in to our Quarterly Report April 10 for field reports from the dealmakers in the M&A trenches on deals closing globally.
Plus, details on the key deals, trends and valuations in the Horizontal, Vertical, Consumer, Internet, Infrastructure and IT Services markets for Q1:2014.
The Strategic Vision: Visualizing Data From Multiple SourcesInside Analysis
The Briefing Room with Barbara Wixom and Tableau
Live Webcast on March 18, 2014
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=2ce6977f93f7a3004e6084518e4ae1e3
Today’s data consumer can be just about anyone, from the CEO to the retail floor associate. With information assets sprawling across the enterprise and the Web, bringing them all together into a single, accessible view can turn into an onerous process. But when users are given access to data from cloud applications and on-premise data sets, every decision from the top down can be information-driven.
Register for this episode of The Briefing Room to learn from MIT Analyst Barbara Wixom, who will explain how leveraging the cloud as a delivery mechanism can play a key role in generating business value and insight. She will be briefed by Suzanne Hoffman of Tableau, who will show how Tableau Online can help analysts and consumers uncover the value of data. She’ll discuss how the advantage of connecting cloud-based applications with other data sources can drive decisions faster and help businesses stay nimble.
Visit InsideAnlaysis.com for more information.
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
In this on-demand webinar, we've discussed:
- Key takeaways on Shadow IT you need to know to protect your data in the cloud.
- Surprising Shadow IT statistics are disclosed and how to proactively take charge.
- Recommendations on cloud management strategies.
The panelists include renowned security experts Chenxi Wang - former Principal Analyst at Forrester Research, Rob McGillen - CIO for Grant Thornton, and Paul Simmonds - former Global CISO for AstraZeneca.
***Please Note: The link to the recorded on-demand webinar is on the last slide.
The 10 most influential leaders in security, 2021Merry D'souza
CIO Look is pleased to announce “The 10Most Influential Leaders in Security, 2021”. This edition sheds light on the top-notch solutions of security companies & ingenious mind behind them.
Security of Things World USA 2016 - Post Event ReportRamona Kohrs
Security of Things World USAtook place on Nov 3-4 in San Diego, CA and was a huge success. Security experts from all major business and industrial sectors met up to discuss and define the most important issues when it comes to security and the Internet of Things.
We had the pleasure of welcoming a variety of very interesting expert speakers ranging from the CISO of the FBI, Arlette Hart, talking about building security into the next generation of things to Larry Clinton (CEO of ISA) sharing his cybersecurity scenario 2020 and 40 other great talks.
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
Industrial Control Cybersecurity USA October 6th and 7th
Sacramento California USA
Identify, protect, detect, respond and recover.
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy and Water Sector.
The 2014 IT Summit is a program for Executives and professionals in IT. Once a year the Connecticut Tech Council and Mohegan Sun Convention Center host the IT Summit.
E 060 oil gas cyber security north americaAlia Malick
Building on 8 years developing conferences in the Cyber Security space the SMi Group are delighted to announce launch their 6th in the series Oil and Gas Cyber Security North America. This conference will provide delegates with an information packed two day agenda with representatives from across the industry, giving a comprehensive overview of the market, looking at insider threats, the latest technology, live demonstrations, current and future threats, APT and much more.
The event will present itself as the perfect platform for learning about the real issues currently being faced by the industry. Hear from leading experts who are currently facing cyber threats. This is a unique opportunity to hear about cyber security expressed from government personal and the operators as well as understanding key market challenges, regulations, human behaviour and technology available.
Energy storage innovation, both at micro and grid scale, is at the cusp of several major breakthroughs which are already impacting consumer electronics and autonomous transportation and several other consumer and industrial uses. Battery prices have come down significantly. Product options are available. With that comes commercial opportunities, policy challenges, industry disruption, new business models, and an array of new startups. What are some emerging energy storage technologies? Who are the players? What adjacent technologies are moving pieces in this game (IoT, cloud, EVs, utilities, distributed generation, transportation networks, mobility tech, sensors etc.). What will this world look like for industry, startups, governments, and consumers? How can existing infrastructure evolve to enable making the most of such breakthroughs? What are the regulatory obstacles in the five key markets where energy storage might emerge first (EU, Australia, Latin-America, South Africa, and USA)?
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...MIT Startup Exchange
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group. Keynote held at MIT Startup Exchange (STEX) Cybersecurity Innovation workshop (5/28) at MIT on Thursday May 28, 2015, 8:30 AM to 11:30 AM, at One Main Street, Cambridge, MA, USA.
Welcome: "MIT's Cybersecurity startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange, MIT ILP (host), CYBERSECURITY INNOVATION (5/28), MIT STEX cluster workshop, Thursday May 28, 2015, 8:30 AM to 11:30 AM, ,One Main Street, Cambridge, MA.
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange, MIT ILP (host). Presented at MIT Startup Exchange (STEX), cluster workshop on Food Tech Innovation, 22 April, 2015, MIT.
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo. MIT Startup Exchange
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo. Presented at MIT Startup Exchange (STEX) cluster workshop on Food Tech Innovation, 22 April, 2015.
Food, Sensors, Startups - The Road Ahead From a MIT perspectiveMIT Startup Exchange
"Food, sensors, startups - the road ahead from an MIT perspective," Timothy M. Swager, John D. MacArthur Professor of Chemistry at MIT and Faculty Director of the Deshpande Center for Technological Innovation. Presented at the MIT Startup Exchange (STEX) cluster workshop on Food Tech Innovation, 22 April 2015, MIT. Twitter: #STEXfood.
Future opportunities for food tech product innovation from a research perspec...MIT Startup Exchange
"Future opportunities for food tech product innovation from a research perspective," Omer Yilmaz, Ph.D., Assistant Professor of Biology, MIT and gastrointestinal pathologist, Massachusetts General Hospital and Harvard Medical School. Presented at MIT Startup Exchange (STEX) cluster workshop on Food Tech Innovation, 22 April 2015, MIT. Twitter" #STEXfood
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1. Presented by
!
Twitter hashtag #stexcyber http://startupexchange.mit.edu East Arcade WiFi password is #CBRECamb!
Cybersecurity Innovation Workshop
May 28, 2015 One Main Street, Cambridge, MA
AGENDA
8:30am Breakfast and Registration
8:45am Welcome: “MIT’s Cybersecurity Startups,” Trond Undheim, Ph.D., Lead, Startup Initiative, MIT Industrial Liaison Program (host)
9:00am
Introductory remarks: “Connecting Industry to Research, Innovation, and Startups” Karl Koster, Executive Director,
MIT Industrial Liaison Program
9:10am Keynote I: “Corporate trends in cybersecurity,” George Wrenn, Chief Security Officer, and VP Cybersecurity, Schneider Electric
9:30am Keynote II: “Cybersecurity investment trends,” Chris Lynch, Partner, Atlas Ventures
Coffee break (10 min)
9:45am “Securing your money – a FinTech perspective,” Devon Watson, Vice President, Software Research & Strategy, Diebold
10:00am Keynote III: “The urgent need for cybersecurity policy,” Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group
10:15am
Lightning Talks – (MIT-connected startups, ILP member companies, MIT innovators, etc.)
Tavish Baker, Marketing Manager, MIT; Vincent Civetta, VP Product Development, Automatic Data Processing (ADP); John Henry
Clippinger, Executive Director/CEO, ID3, and Research Scientist, MIT Media Lab; Andrew Cockerill, Director, Strategic University
Research Relations, BP; Dr. Wafik Farag, President and CEO, SkyPrise, Inc.; Gagan Prakash, Founder, CEO, Astra IDentity, Inc.;
Steve Whittaker, Head of Strategic U.S. University Research Partnerships, BT
Coffee break (10-15 min)
PANEL DISCUSSION
10:30am Panel Discussion: What’s Next in Cybersecurity Innovation?
• What are important trends in security/trust/cybersecurity tech startups from MIT (and elsewhere)?
• What does the cybersecurity innovation ecosystem look like (infrastructure, interoperability, technology, use cases, stakeholders,
success stories)?
• What are corporate priorities in cybersecurity?
• What is the smart money focused on?
Panelists:
• Chris Lynch, Partner, Atlas Ventures
• Jean Yang & Frank Wang, co-founders, Cybersecurity Factory, MIT CSAIL. Also, see Students launch Cybersecurity Factory
to help launch startups (CSAIL News, 3/31/15)
• Devon Watson, Vice President, Software Research & Strategy, Diebold
• Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group
• George Wrenn, Chief Security Officer, and VP Cybersecurity at Schneider Electric
MIT-connected startup executives:
Eugene Kuznetsov, Co-founder & CTO, Abine
Tina Srivastava, COO, Gigavation
Adam Towvim, CEO, TrustLayers, Inc.
The panel will be moderated by Lori Glover, Executive Director, Cybersecurity@CSAIL, MIT
About us: MIT Startup Exchange connects corporations to MIT startups, fostering quality interactions that lead to strong partnerships with impact
across the MIT innovation ecosystem. The STEX web community platform and database has nearly 1000 active MIT startup companies at all stages of
development and representing seven technology clusters: Tech/ICT, Biotech, Nanotech, Energy Tech, Advanced Manufacturing, Healthcare, and
Hybrid Innovation. See https://startupexchange.mit.edu for more information.
2. Presented by
!
Twitter hashtag #stexcyber http://startupexchange.mit.edu East Arcade WiFi password is #CBRECamb!
Panelists
Karl F. Koster, Executive Director, MIT Office of
Corporate Relations/Industrial Liaison Program
Karl F. Koster is the executive director of the MIT Office
of Corporate Relations. The Office of Corporate Relations
at MIT includes the Industrial Liaison Program, which
celebrated 60 years of service to the Institute and its
corporate partners in 2008.
In that capacity, he and his staff work with the senior
administrative and faculty leadership of MIT in developing and implementing
strategies for enhancing corporate involvement with the Institute. Mr. Koster
has been involved with faculty leaders in identifying and designing a number
of major international programs for MIT. Many of these programs focus on
institutional development and are characterized by the establishment of strong,
international, programmatic linkages between universities, industry, and
governments.
Mr. Koster graduated from Brown University with a B.A. in geology
and economics in 1974, and received an M.S. from the MIT Sloan School of
Management in 1980. At the Sloan School he concentrated in international
business management and the management of technological innovation. Prior
to returning to MIT, Mr. Koster worked as a management consultant for seven
years in Europe, Latin America, and the United States on projects for private
and public sector organizations.
Eugene Kuznetsov, Co-founder & Chairman,
Abine, Inc.
Eugene Kuznetsov, Abine Chairman and co-founder, has
earned recognition for both his business and technical
leadership, including the prestigious InfoWorld Top 25
CTOs of 2005 and regional Ernst & Young Entrepreneur
of the Year 2006 awards.
He was most recently an executive at IBM, with responsibility for
product management and marketing of SOA appliances. Eugene joined IBM
through acquisition of DataPower in October 2005. He founded DataPower in
1999 and served as President until Spring 2003 as it grew from one to 75
employees, raising over $20M from investors and building a customer list of
household names.
Kuznetsov's articles have appeared in numerous tech publications,
and he has spoken at conferences and events including Digital ID World,
NetSec, JavaOne, Networld+Interop, and the IT Security & Privacy
Conference.
Eugene earned a BSEE from MIT.
Chris Lynch, Partner, Atlas Ventures
Chris is a founder of FKA (the technology team formerly
at Atlas Venture) and focuses on big data and disruptive
infrastructure.
At FKA, Chris is responsible for their investments in
Captricity, Data Robot, Nutonian, Sqrrl, and Threat Stack,
as well as Objective Logistics, Recorded Future, and
Reddo Mobility. Chris also led FKA’s investment in Hadapt, where he served
as chairman prior to the company’s sale to Teradata (NYSE: TDC), and was
instrumental in the sale of Lagoa to Autodesk (NASDAQ: ADSK). He
previously served as chairman of Azuki Systems before its sale to Ericsson in
2014. Chris is an advisor and mentor to many Boston area entrepreneurs and
is the co-founder of hack/reduce, a non-profit community space in Cambridge
focused on big data technology.
Prior to joining Atlas in 2012, Chris was CEO of Vertica Systems,
where he led the company from late-stage startup to the number one ranked
big data company in the market and its acquisition by HP in March of
2011. Before that he was an executive at four successful early-stage startups
that were acquired by public companies.
Chris received an M.B.A. from the McCallum Graduate School of
Business at Bentley University, and a B.S. in business administration from
Suffolk University. He received an honorary doctor of commercial science
from Bentley University.
Tina Srivastava, COO, Gigavation
Dr. Tina P. Srivastava has held senior engineering
leadership and technical management roles across the
aerospace, national security, and commercial sectors. She
was awarded the National Industry Technical Innovation
Award as Chief Engineer of a >$40M advanced program.
She also serves on the Board of Directors of the
International Council on Systems Engineering (INCOSE) as an elected
officer. She has been published in the areas of aerospace systems, lean product
and service platform strategies, design structure matrices, hybrid vehicle
design, advanced thermal management, and radar systems.
She holds a Ph.D. from MIT in strategy, innovation, and
engineering; a S.M. in engineering management from MIT; and a S.B. in
aeronautics and astronautics engineering from MIT.
Dr. Srivastava was awarded the MIT Legacy Award for “making a
sustained and outstanding contribution to the MIT community.” She was also
awarded the inaugural David Wright Leadership Award by INCOSE for
demonstrated technical and interpersonal skills in the art and practice of
system engineering as a means for solving the great challenges of our planet.
Tina is a certified pilot and flies a Cessna 172S. She volunteers at
the Amelia Earhart events, MIT Flying Club, and FIRST robotics to
encourage young women and men to pursue careers in engineering, science,
and aviation.
Adam Towvim, CEO, TrustLayers, Inc.
Adam Towvim, is CEO and co-founder of TrustLayers, a
new company commercializing MIT research to automate
data policy compliance. He has over two decades of
experience with data and privacy.
Prior to TrustLayers, Adam was Jumptap’s vice
president of Business Development, where he was
responsible for Jumptap’s data, audience monetization, and
privacy strategy. While at Jumptap, Adam co-founded the DAA’s Mobile
Advisory Committee.
Previously to Jumptap, Adam led Radialpoint’s entry into the U.S.
security market to create a $25mm subscriber data business. Before
Radialpoint, he directed Lightbridge’s product management organization to
define new subprime growth areas. Adam has also served as a consultant with
Diamond Management & Technology Consultants (now PwC Diamond
Advisory), where he served on the interim executive launch team of
Switzerland’s first true 3G operator and Europe’s first app marketplace.
Before Diamond, he led launch teams for American Management Systems’
U.S. and European Mobile Telecom practice. Adam holds a B.A. from
Columbia University, where he studied under Alan Westin, and an M.B.A.
from Carnegie Mellon’s Tepper School of Business.
3. Presented by
!
Twitter hashtag #stexcyber http://startupexchange.mit.edu East Arcade WiFi password is #CBRECamb!
Trond Undheim, Ph.D., Lead, Startup Initiative,
MIT Industrial Liaison Program
Trond heads up the Startup Initiative at MIT’s Industrial
Liaison Program (ILP), facilitating productive
relationships between industry and MIT’s startup
ecosystem. He is a senior lecturer at the MIT Sloan
School of Management.
Trond is a serial entrepreneur with Scandinavian roots and is currently the
founder of Yegii, Inc., the insight network, and managing director of Tautec
Consulting.
Trond is a leading expert on technology development across industries
such as IT, Energy, and Healthcare. His knowledge spans entrepreneurship,
strategy frameworks, policymaking, action learning, virtual teamwork,
knowledge management, standardization, and e-government. He wrote the
book Leadership From Below (2008). Trond speaks six languages and is a
frequent public speaker on business, technology, and wine. Trond was a
strategy/business development executive at Oracle Corp. (2008-12) and a
policymaker in the EU (2004-8) where he built the ePractice.eu web platform
with 120,000 members. He has worked with multinational companies, with
mid-caps and startups in Brazil, China, Colombia, France, Indonesia, Norway,
the UK, and the U.S.
Trond holds an M.A. in sociology and a Ph.D. in sociological
technology and policy studies from the Norwegian University of Science and
Technology.
Frank Wang, Co-founder, Cybersecurity
Factory, MIT CSAIL
Frank Wang is a Ph.D. student at MIT focusing on
building secure systems. He did his undergraduate at
Stanford, focusing on cryptography.
He runs the MIT security seminar and is a member of the student team at
Roughdraft Ventures, which provides small capital to early stage student
startups.
John has interned at the security teams at Google and Facebook as well
as consulted for various security companies, such as Qualys.
Devon Watson, Vice President, Software
Research & Strategy, Diebold
Devon Watson leads Diebold's software research &
strategy team developing novel solutions spanning
payments, fin-tech and banking experience. Prior to
Diebold, Devon held various roles in venture capital, start-ups and technology
consulting. In his most recent positions he led business development at
Apprenda, a leading cloud computing platform and was Vice President at
Primary Ventures, a venture capital fund in New York.
Devon holds a B.S. in Management, Information Systems from
Clarkson University.
Daniel Weitzner, Director, MIT CSAIL
Decentralized Information Group
Daniel Weitzner is the Director of the MIT CSAIL
Decentralized Information Group and teaches Internet
public policy in MIT’s Computer Science Department.
His research includes development of accountable
systems architectures to enable the Web to be more responsive to policy
requirements.
From 2011-2012, Weitzner was the United States Deputy Chief
Technology Officer for Internet Policy in the White House. He was
responsible for the Obama Administration’s Consumer Privacy Bill of Rights
and the OECD Internet Policymaking Principles.
Weitzner has been a leader in the development of Internet public policy
from its inception, making fundamental contributions to the successful fight
for strong online free expression protection in the United States Supreme
Court, and for laws that control government surveillance of email and web
browsing data.
He is a founder of the Center for Democracy and Technology, led the
World Wide Wed Consortium’s public policy activities, and was Deputy
Policy Director of the Electronic Frontier Foundation.
Weitzner received his B.A. in philosophy from Swarthmore College and
his J.D., Law from Buffalo Law School.
George Wrenn, Chief Security Officer, and VP
Cybersecurity, Schneider Electric
George Wrenn presently serves as CSO & vice president
of cybersecurity for Schneider Electric. He has more than
20 years of experience in the field of cybersecurity.
He is a research affiliate in management science at
the MIT Sloan School of Management.
George is expert in cloud security and has been awarded U.S. patents in
this area. Other roles in his career have spanned from Managed Security
Services (MSS) to Security Product Development and Secure Cloud
Computing.
He is a USAF/Aux Pilot and Officer, serving as 1st. lieutenant, and has
received a National Commander's Commendation Award for outstanding duty
performance with the Hanscom Composite Squadron (HCS-MA-043) based at
Hanscom Air Force Base.
George is a graduate of Harvard University and has attended executive
programs at Harvard Business School. As a graduate fellow at MIT since
2001, he has conducted research and advanced coursework at the MIT Media
Lab, the Sloan School of Management, the School of Engineering, the School
of Architecture and most recently the MIT Security Studies program working
on cyber warfare frameworks.
Jean Yang, Co-founder, Cybersecurity Factory,
MIT CSAIL
Jean is a final-year Ph.D. student at MIT. Jean creates
programming languages and tools that make it easier for
people to write the programs they intend to write. During
her Ph.D. she created a language, Jeeves,that automatically enforces
information flow policies for security and privacy.
She graduated with a degree in computer science from Harvard
University in 2008, and has interned at Google, Facebook, and Microsoft
Research. She won Best Paper Award at the Programming Languages and
Implementation conference in 2009 for her paper "Safe to the Last Instruction:
Automated Verification of a Type-Safe Operating System.”
Moderator
Lori Glover, Executive Director
CyberSecurity@CSAIL
Lori Glover is the managing director of Alliances CSAIL
MIT and the Executive Director of
CyberSecurity@CSAIL.
Lori leads global partnerships and alliances in the U.S., Asia, Europe
and Latin America for the Computer Science and Artificial Intelligence
Laboratory (CSAIL) - the largest lab at MIT and home to BigData@CSAIL,
CyberSecurity@CSAIL, and Wireless@MIT.
Her team is responsible for corporate and organizational engagement
through the CSAIL Alliance Program, the Visiting Industry Researcher
program, CSAIL start-ups and technology ecosystem, the professional
education partnership with EdX and MIT Professional education, as well as
talent acquisition/recruiting programs within CSAIL.
Lori received her B.A. in English from Providence College and her Juris
Doctor, Law from Suffolk University Law School.
4. Presented by
!
Twitter hashtag #stexcyber http://startupexchange.mit.edu East Arcade WiFi password is #CBRECamb!
Lightning Talk
Tavish Baker, Marketing Manager, MIT
Tavish Baker is the marketing manager at MIT.
He attended Long Island University and
Northeastern University.
Vincent Civetta, VP Product Development,
Automatic Data Processing (ADP)
Vincent is the Vice President of product development for
Automatic Data Processing (ADP), an international data
services company with over $12 billion in revenues and
600,000 clients.
He has been instrumental in implementing ADP’s software-as-a-service
strategy – including the pioneering of ADP’s Identity & Security Service.
Today that service is responsible for managing over 40 million users accounts
and growing at about a million new users per month.
Vincent has held senior posts in research & development, infrastructure
engineering and information security.
John Henry Clippinger, Founder and Executive
Director, ID3, and Research Scientist, MIT
Media Lab
John Henry Clippinger is research scientist at the MIT Media
Lab Human Dynamics Group, where he is conducting
research on trust frameworks for protecting and sharing personal information.
With Professor Alex Pentland of MIT, he is founder and executive director of the
newly formed ID3
(Institute for Institutional Innovation & Data Driven Design)
which is developing an open governance platform to support an ecosystem for
data-driven services, infrastructures, and enterprises.
He is the author of A Crowd of One: The Future of Individual
Identity (Perseus, Public Affairs, 2007, and The Biology of Business, Natural
Laws of Enterprise, (Josey Bass, 1998). Previously, he was director of
Intellectual Capital, Coopers & Lybrand and the founder and CEO of four
software companies. He is co-chair of Open Identity Exchange Advisory Board
and has lectured at Stanford, Brandeis, MIT, Yale, Boston University, Chinese
Academy of Science, Harvard, Brown, Dartmouth, UPenn, among others.
Dr. Clippinger is a graduate of Yale University and holds a M.A. and Ph.D.
from the University of Pennsylvania.
Andrew Cockerill, Director, Strategic University
Research Relations, BP
Andrew graduated in mechanical engineering from the
University of Manchester and has over 30 years experience in
the oil and gas industry. He began his career as a plant
engineer with BP Chemicals in Scotland. Following an assignment with a
subsidiary business in flare system design and marketing, he moved to the
Exploration and Production segment and held a variety of roles in project
management, materials & corrosion, and field operations based in London, Houston,
San Francisco and Alaska.
Over the last several years his focus has shifted to enhancing the overall
technical capability of the company and has worked in the areas of Knowledge
Management, Team collaboration, Visualisation and Resource planning. Several
years ago he established BP’s Advisor Program for senior engineers and scientists in
the company.
In his current role as Director, University Relations, he established BP’s
framework for strategic university partnerships and leads efforts to build synergies
between research, recruitment, executive development, and policy development. He
is currently based at MIT in Boston.
Dr. Wafik Farag, President and CEO, SkyPrise, Inc., Dr. Wafik Farag is
a visionary business and information strategist. Currently at SkyPrise, Inc., Dr.
Farag’s consulting capacity integrates multi-discipline
technologies for clients to smartly capitalize on the “business
of information” converting it into competitive business
growth.
As a business executive, he provides leadership
consulting to Fortune 100, mid-cap, and startup companies,
both domestic and international. Dr. Farag is the inventor of
a game-changing paradigm: “Dynamic Information”
enabling novel business strategy to deliver actionable value for companies in
flux.
Dr. Farag was a co-founder of Justa, an information infrastructure
company, acquired by Wallaware Inc. Dr. Farag was also formerly a Director at
Perot Systems, where he advised global Fortune 100 companies on strategies for
process optimization to improve productivity, during which time PerotSystems
(Dell) went public.
He holds a U.S. patent in managing dynamic contextual-information to
deliver next generation solutions.
Dr. Farag received both his M.S. and Ph.D. in Computer Science and
Engineering from the University of Michigan.
Gagan Prakash, Founder, CEO, Astra Identity, Inc.
Gagan Prakash is the founder of Astra IDentity, the makers
of PhishingGuardian a product that helps protect
organizations against phishing and spear phishing attacks.
Prior to Astra IDentity, Gagan co-founded a company,
which provides enterprise-class IT services such as Microsoft Exchange Server &
Microsoft SharePoint as hosted services, which are now used by thousands of
organizations worldwide. Gagan is a software developer with a B.S. degree from
Iowa State University and an M.B.A. in Innovation and Global Leadership from
the Massachusetts Institute of Technology, Sloan School of Management.
Steve Whittaker, Head of Strategic U.S. University
Research Partnerships, BT
Steve Whittaker is a Chief Researcher at BT and is
responsible for its partnerships with U.S. universities and
business schools. He splits his time between Cambridge, MA
and Vienna VA, and has spent over ten years as a visiting scientist at the MIT
Media Lab.
Prior to moving to the U.S., Steve spent fifteen years at BT’s Adastral
Park research center in the U.K. where he held a range of research, research
management and consulting roles.
He has a wide range of interests in emerging technologies and their
impact on business and society, including privacy and cyber-security policy.
He has a particular focus on the management of innovation.
Steve received his B.Sc. (Hons) in computing and electronics, from the
University of Durham, United Kingdom.