Cyber Byte Newsletter

The Cybersecurity Student Working Group has published the first issue, of what is hoped to become a long and enduring club publication.  The newsletter’s aim is to share with club members the current activities. e.g. upcoming speaker series, discussion groups, and many others.  It will also include articles related to past speaker events and op-eds from club leadership on key cyber-security events shaping cyber policy.  All club members will receive future offerings through email distro and CSWG Facebook group.  Stay tuned as the forthcoming issue is slated for this fall.

 

2017 Cyber 9/12 Competition

MIIS students attended the annually held Atlantic Council’s Cyber 9/12 Competition in Washington, DC.  The competition brings coach-led student teams from around the country, both undergraduate and graduate, to compete against one another in what is considered the competition for students studying cyber-security.  In competing, teams are given a hypothetical scenario whereby crafting a relevant cyber policy memo and accompanying brief.  There are a total of three rounds, each harder than the previous. Unfortunately, the “MIIS Takes” did not move onto the next round.  The competition was a great experience for all those who attended.  There were breakout sessions, a career panel, live hacking demo, and a job fair.  For further information on the competition, follow the link below.

http://www.miis.edu/about/newsroom/stories/node/46317

PhD Candidate Bill Marczak of UC Berkeley, 11 October 2016

 

speakerseries_bill-marczak_flyer_v2_jl-edits-copy

The Speaker Series explored how increasing use of encryption has forced authoritarian governments to innovate in the field of information controls.  No longer able to easily block undesirable information outright, governments turn to novel controls such as Internet disruptions targeted at certain areas or individual users, attacking overseas websites sharing undesirable information, and the use of targeted electronic surveillance to identify and arrest users who share undesirable information.  Bill Marczak’s presentation identified the various actors involved in these new types of information controls, including governments, cyber mercenary groups, cyber militias, commercial vendors, and the tools and technology they use.