The November Cybersecurity and Information Environment webinar is pleased to host the Cyber Resilience Institute’s (CRI) Doug DePeppe and Jane Ginn on November 17th at 3PM MST.
The CRI team will discuss the use of parallel hunting techniques – using social media and technical telemetry – to reveal disinformation and misinformation sources. Link analysis to conduct deep source checking helps analysts evaluate and connect influencers and trending hashtags to their sources, which is especially critical to reveal adversary nation-state influence operations, such as election interference.
Those interested will be able to join a Call to Action, facilitated by the National Cybersecurity Center (NCC), in which we explore opportunities to collaboratively increase cyber resilience.
Join CRI’s board member, Christopher Gorog as he talks with Ambareen Sirai, PhD, Professor and Director of Cybersecurity Education Research & Outreach Center Comp Science at Tennessee Tech and Founder/Chair at WiCyS . They discuss computer science and cybersecurity education, as well as the research that those in academia are doing regarding cybersecurity and how this research is used throughout the industry. You can also click on this link for previous New Cyber Frontier podcasts.
The Fourth Annual International Information Sharing Conference (IISC) is being held virtually on Wednesday, September 30 from 10 a.m. to 3 p.m. CST.
Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they come together to address information sharing issues impacting communities locally, regionally, nationally and abroad around the theme “Building Mature Information Sharing States and Communities”.
For detailed program and speaker information, please click on the following link.
With a national and international scope, our mission is to help communities build operational and sustainable Public-Private Partnerships (PPP) and cybersecurity information sharing environments, centered on enabling market forces, and using various programs, initiatives, channels, and Information Sharing and Analysis Organization (ISAO) models for the benefit of both government organizations and the private sector.
Thought leadership in cybersecurity policy and program design