Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Protect Your Business From Data Privacy Leaks Using Automated Security Testing James Croall, Product Management Director, Synopsys Join us for a webinar on the automated source code data protection measure with James Croall, Product Management Director, Synopsys. James will discus... 3 months ago | 39 mins WiCyS 2022 Capture the Flag (CTF) Competition Prep Leena Arora (Carnegie Mellon University Software Engineering Institute) Curious to learn more about this year’s WiCyS CTF competition? Come join us as we talk about the CTF format, duration, registration process, system r... 1 year ago | 43 mins Let’s Crack Passwords Marisa Midler, Chesleah Kribs, and Destiney Plaza ( Carnegie Mellon University Software Engineering Institute) Have you ever wondered how a hacker can crack your password? Learn from Penetration Testers as they demonstrate password cracking. During this talk yo... 2 years ago | 63 mins Sensing Human Gestures the Future Interfaces Group @ Carnegie Mellon University Karan Ahuja, PhD Candidate, Future Interfaces Group @ Carnegie Mellon University Educational webinar from the Augmented Reality for Enterprise Alliance 2 years ago | 51 mins Cyber, Protection and You! Carol Ware (CMUSEI) In this webinar WiCyS strategic partner Carnegie Mellon University Software Engineering Institute will discuss easy practices that anyone can perform ... 7 months ago | 29 mins Threat Landscape 2022: How to Future Proof Your Cybersecurity Strategy Mary Ann Blair, Chief Information Security Officer and Ed Hudson, Chief Information Security Officer This is a challenging time to be an IT security professional in education: Remote work and learning are expanding and blurring the borders of traditio... 1 year ago | 64 mins Is there a coming 'Phishpocalypse'? Phil Syme, Distinguished Engineer, Cloudflare Deep language-based neural networks are surprisingly good at generating and detecting text of all forms. Some AI labs have been hesitant to release t... 9 months ago | 48 mins Threat Landscape 2022: How to Future Proof Your Cybersecurity Strategy Mary Ann Blair, Chief Information Security Officer and Ed Hudson, Chief Information Security Officer This is a challenging time to be an IT security professional in education: Remote work and learning are expanding and blurring the borders of traditio... 1 year ago | 64 mins Mandiant Threat Intelligence Landscape for Higher Education Luke McNamara, Principal Analyst, FireEye | Mandiant, joined by Mary Ann Blair, Assistant Vice President, CISO, CMU, Hosted by Carnegie Mellon University As cyber-attacks continue to grow in frequency and scope across higher education institutions, tracking threat ac... 3 years ago | 56 mins Threat Landscape 2022: How to Future Proof Your Cybersecurity Strategy Mary Ann Blair, Chief Information Security Officer and Ed Hudson, Chief Information Security Officer This is a challenging time to be an IT security professional in education: Remote work and learning are expanding and blurring the borders of traditio... 10 months ago | 64 mins Load more