Oct
12
8:30 AM08:30

Evidence-Based Cybersecurity

  • Georgia State University Buckhead Center room 1212 (map)
  • Google Calendar ICS

Cyber-dependent crimes are offenses that can only be committed by using a computer, computer networks, or other forms of Information and Communication Technology, and include hacking, distribution of malware and DDoS attacks. These attacks have become a common global problem. Acknowledging the potential risks these crimes pose to large organizations (both governmental and private) and to private Internet users’ privacy, many efforts are devoted to developing technical tools and official policies designed to prevent and mitigate the consequences of cyber-attacks against organizations and individuals. But despite the growing number of individuals and organizations that implement these tools and policies on their computing environments, the effectiveness of these strategies in preventing and mitigating the occurrence of malicious cyber activities is still relatively unclear. The symposium participants will present the key principles of the evidence-based cybersecurity approach, while demonstrating the potential effectiveness it carries in guiding policy efforts and shaping the design of technical tools that aim to prevent and mitigate the consequences of cybercrime. In parallel to the symposium, we will host a mini Hackathon in which GSU students and other interested crackers are encouraged to participate!

To register for the symposium (registration fee $55) click here: https://secure.touchnet.com/C20797_ustores/web/product_detail.jsp?PRODUCTID=1959

To register for the Hackathon (free registration) send an email to EBCybersec@gmail.com

Program

8:30 registration and breakfast

9:00 Deans Wallace and Phillips opening statements

9:10 Dr. Donald Hunt – On the effectiveness of Existing Cybersecurity
Policies and Tools in Preventing Cyber Crime

9:40 Dr. David Maimon – Evidence based cybersecurity: A Human Focused Approach to Protect the Cyber Environment.

10:30 Dr. Richard Baskerville- Evidence Based Cybersecurity and Its Potential in Shifting the Attacker-Defenders Asymmetry

11:30 Break-lunch

12:30 Evidence based cybersecurity in the context of the Fin tech industry-A Panel in the participation of local CISOs and Compliance officers.

1:45 Closing remarks

View Event →