SHARE
ET&S Strategic Communications

October is National Cyber Security Awareness Month. In recognition, the ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û (×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û) will host a series of virtual events and resources about information protection and data security risks.Ìý Resources offered include good practices, tools, and solutions to identify and protect sensitive information. These events are open to all students, faculty and staff at Granite State College, Keene State College, Plymouth State University, the University of New Hampshire (UNH), UNH Law and UNH Manchester.Ìý Members of the public are also welcome to attend.ÌýRegistration is required. You will receiveÌýa link to each Zoom webinar for which you register via email prior to each session.Ìý

2020ÌýEvent Schedule and Registration

Cybersecurity Policy and Risk Management: Lessons from Capstones
Saturday, October 17 | 3:00 – 4:30Ìýp.m.

Presenters: Panel of Recent M.S. Cybersecurity Policy and Risk Management Graduates

Recent graduates of UNH’s master’s in Cybersecurity Policy & Risk Management will discuss their various projects and capstone experiences:

  • Mike Judge (’19G): Data Security and Privacy Awareness Training for NH School Faculty
  • Margaret Corcoran (’20G): The Use of Cybersecurity to Support Healthcare Strategic Objectives using NIST Frameworks
  • Rori Boyce-Werner (’20G): ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û Information Security Policies and Standards
  • James Glennon (’20G): Risk Assessment of a Model Company Using a Custom Risk Assessment Framework
  • Jeff Grazulis (’20G) & Gabe Howard (’20G): Anytown Project (Cybersecurity & Risk Management for Small Municipalities)
  • Moderator: Prof. Maeve Dion

Where:ÌýZoom Webinar
Register Here:Ìý


Hardware Security: The Root of Trust
Monday, October 19 | 2:00 – 3:00 p.m.
Presenter: Qiaoyan Yu, UNH Durham CEPS
Description: The globalized nature of the integrated circuit (IC) supply chain challenges the assurance of system security and integrity. As hardware attacks occur at every stage in the IC design flow, it becomes imperative to develop new design methods to enhance system resilience against security threats. This presentation will introduce the security threats originating from the IC supply chain and cutting-edge research efforts in this area.

Where:ÌýZoom Webinar
Register Here:Ìý


Organizational Obstacles to Enacting Policy
Tuesday, October 20 | 1:00 – 2:00 p.m.
Presenter: Nate Jensen, UNH Manchester M.S. Cybersecurity Policy and Risk Management
Description: A brief presentation of Prof. Jensen’s experiences and lessons learned as a DHS Assistant Secretary navigating organizational impediments to enacting better cybersecurity and other policies.Ìý Developing good policy is just half the battle; ensuring that the various actors in your organization are empowered to act on your policy—and do so—is the harder part.

Where:ÌýZoom Webinar
Register Here:Ìý


A Modern Hybrid Network: Design, Config & SecurityÌý
Wednesday, October 21 | 12:00 – 1:00 p.m.
Presenter: Tim Chadwick, UNH Manchester MS/BS Information Technology
Description:ÌýIn this talk,Prof. Chadwick will lay out the requirements and design goals which lead to a modern hybrid network.ÌýÌýWith high bandwidth regional networks becoming ever more available and applications requiring ever more distributed computing, the need for flexible designs that must address ever more security boundaries is increasing.ÌýWith the design in place we will look at the specific system configurations and what they mean for security at the interfaces, as well as the administration controls and the policies in place to ensure they are managed correctly.
Where:ÌýZoom Webinar
Register Here:Ìý


General Data Protection Regulation and What it Means to You
Wednesday, October 21 | 6:30 – 7:30 p.m.
Presenter: Randy Magiera, UNH Manchester M.S. Cybersecurity Policy and Risk Management
Description: The General Data Protection Regulation (GDPR) went into effect on May 25, 2018. Two years later, there are still many questions about this comprehensive privacy law. This session will delve into common aspects of GDPR, help dispel some common misconceptions, and help attendees understand how it may or may not apply to their organizations.

Where:ÌýZoom Webinar
Register Here:Ìý


The FBI Has Not Been Here: Librarians, Privacy, and Supporting Student Activism
Monday, October 26 | 12:00 – 1:00 p.m.
Presenter: Jay L. Colbert, UNH Durham Library
Description: Mr. Colbert, Assistant Professor and Metadata & Discovery Strategy Librarian at Dimond Library, will provide a presentation on the privacy risks to student activists and the role librarians play in protecting student privacy to support that activism.

Where:ÌýZoom Webinar
Register Here:Ìý


Forcing TikTok Sale: How Can They Do That?
Tuesday, October 27 | 12:00 – 1:00 p.m.
Presenter: Maeve Dion, UNH Manchester M.S. Cybersecurity Policy and Risk Management
Description: In this session, Prof. Maeve Dion gives an overview of the Committee on Foreign Investment in the United States (CFIUS) and executive actions in the telecom space related to national security (e.g., foreign direct investment policies and national security related restrictions on critical infrastructure investments). We discuss the recent TikTok and WeChat concerns.

Where:ÌýZoom Webinar
Register Here:Ìý


Clarifying the Role of Cybersecurity in Business Continuity Planning
Thursday, October 29 | 12:00 – 1:00 p.m.
Presenter: Nancy Grant, UNH Manchester M.S. Cybersecurity Policy and Risk Management
Description: This presentation introduces the Business Continuity Planning Process and the roles of Cybersecurity and Information Technology. Examples are provided in the context of both nonprofits and for-profit businesses.ÌýÌýThe critical importance of integrating Continuity Planning and Cybersecurity into ongoing operations is emphasized throughout.
Where:ÌýZoom Webinar
Register Here:Ìý


Questions about NCSAM events, changes to event registrations, or suggestions for future presentation topics can be sent to Cybersecurity.GRC@usnh.edu.

**Special thanks to all the faculty members who offered to present as part of this month’s activities and to Maeve Dion of UNH Manchester for soliciting, scheduling, and coordinating all presenters and to Andy Dolph of ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û Enterprise Technology & Services for making those presentations possible.