Breakfast Talk: Cybersecurity Simplified

Saturday, January 13, 2018 from 8-10am at North Church; cost is $5
RSVP to 716.632.1330 or with number of people attending

No one wants to think we could be vulnerable to attacks to our nation’s critical infrastructure such as the electrical power grid, transportation system, and financial and military assets. Today, however, more than ever, cybersecurity is an issue we must face square-on.

You’re invited to hear from two experts from the University at Buffalo–Professor of Computer Science and Engineering and Associate Dean for Graduate Education and Research in the Department of Computer Science and Research, Shambhu Upadhyaya; and Clinical Associate Professor and Director of Sleiman Computer Laboratories David Murray–talk about what is being done on their campus, security best practices, attack scenarios, and password management.

Hosted with Amherst and Clarence Presbyterian churches, come and enjoy a light breakfast and meet the professors and fellowship with each other. Cost is $5; RSVP to 716.632.1330 or with number of people attending.

Shambhu-UpadhyayaProfessor Upadhyaya also directs the Center of Excellence in Information Systems Assurance Research and Education, designated by the National Security Agency and the Department of Homeland Security. His current projects involve insider threat assessment, continuous authentication, and deception to deal with advanced persistent threats. He holds a bachelor’s and master’s degrees in electrical engineering from the Indian Institute of Science, Bangalore, India, and a Ph.D. in electrical and computer engineering from the University of Newcastle in Australia.

Murray 10-17Professor Murray earned his undergraduate and MBA from the UB. He teaches Digital Forensics, Introduction to Management Information Systems, and business courses. He has led the School of Management’s Western New York Cybersecurity Workshop Outreach program featuring live demonstrations of cybersecurity equipment, hands-on activities and basic lessons on a range of topics including data encryption, wireless security, digital forensics, firewalls, and strong passwords for middle and high schools.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s