Penn State competitive event simulates large-scale hack and system breach
Posted on March 1, 2019CARLISLE, Pa. — Data breaches and cyber hacks are a major concern for businesses, organizations, and governments. Hacks disrupt operations, put sensitive information at risk, harm an organization’s reputation, jeopardize national security and cost the economy billions of dollars each year. If your organization was hacked, would you know what to do?
Register today to participate in the 2019 Penn State Hack Response Simulation Competition, to be held from 8:30 a.m. to 3:30 p.m. on Wednesday, Mar. 13, at the Technology Support Building, 300 Science Park Rd., State College, Pennsylvania. Jointly developed by Penn State’s Dickinson Law and multiple units from across Penn State, this competitive simulation is designed to help faculty develop interdisciplinary educational approaches to hacks, and to teach students how to understand the full-range of necessary steps to address and minimize harm from security breaches.
“When businesses face hacks or deal with hack-related litigation, we frequently see a disconnect between tech teams, law folks and business personnel,” said Anne Toomey McKenna, Distinguished Scholar of Cyber Law, Dickinson Law, and professor of practice with the Institute for Computational and Data Sciences, who spearheaded the design of the simulation. “That disconnect often results in unintended and costly consequences, including extensive legal fines. That disconnect starts with how we silo education. Tech stays in tech lanes, and law stays in law lanes. That no longer works. Merged knowledge of cyber technology, legal compliance, and business and communication is now required to avoid these costly pitfalls. Fortunately, here at Penn State, many units recognize the critical need for interdisciplinary education.”
No technical, legal or communications background is required to participate in the hack. Faculty, students, staff and invited guests from technology, law, and business/communication units will work together on interdisciplinary teams to plan, share knowledge and respond — technically and legally — to a high-level hack that occurs through a simple phishing email. Then they will listen to experts from a diverse array of disciplines walk through what is the right response, each step of the way.
The closed cyber hack simulation will involve a hack and system breach and theft of data that potentially consists of the following data: PII, biometric data, medical data, and national security information.
This event is open to all Penn State faculty, staff, students and invited guests. It is free to attend. Breakfast and lunch are included with registration. Space is limited; early registration is strongly encouraged.
Share
Related Posts
- Featured Researcher: Nick Tusay
- Multi-institutional team to use AI to evaluate social, behavioral science claims
- NSF invests in cyberinfrastructure institute to harness cosmic data
- Center for Immersive Experiences set to debut, serving researchers and students
- Distant Suns, Distant Worlds
- CyberScience Seminar: Researcher to discuss how AI can help people avoid adverse drug interactions
- AI could offer warnings about serious side effects of drug-drug interactions
- Taking RTKI drugs during radiotherapy may not aid survival, worsens side effects
- Cost-effective cloud research computing options now available for researchers
- Costs of natural disasters are increasing at the high end
- Model helps choose wind farm locations, predicts output
- Virus may jump species through ‘rock-and-roll’ motion with receptors
- Researchers seek to revolutionize catalyst design with machine learning
- Resilient Resumes team places third in Nittany AI Challenge
- ‘AI in Action’: Machine learning may help scientists explore deep sleep
- Clickbait Secrets Exposed! Humans and AI team up to improve clickbait detection
- Focusing computational power for more accurate, efficient weather forecasts
- How many Earth-like planets are around sun-like stars?
- Professor receives NSF grant to model cell disorder in heart
- SMH! Brains trained on e-devices may struggle to understand scientific info
- Whole genome sequencing may help officials get a handle on disease outbreaks
- New tool could reduce security analysts’ workloads by automating data triage
- Careful analysis of volcano’s plumbing system may give tips on pending eruptions
- Reducing farm greenhouse gas emissions may plant the seed for a cooler planet
- Using artificial intelligence to detect discrimination
- Four ways scholars say we can cut the chances of nasty satellite data surprises
- Game theory shows why stigmatization may not make sense in modern society
- Older adults can serve communities as engines of everyday innovation
- Pig-Pen effect: Mixing skin oil and ozone can produce a personal pollution cloud
- Researchers find genes that could help create more resilient chickens
- Despite dire predictions, levels of social support remain steady in the U.S.
- For many, friends and family, not doctors, serve as a gateway to opioid misuse
- New algorithm may help people store more pictures, share videos faster
- Head named for Ken and Mary Alice Lindquist Department of Nuclear Engineering
- Scientific evidence boosts action for activists, decreases action for scientists
- People explore options, then selectively represent good options to make difficult decisions
- Map reveals that lynching extended far beyond the deep South
- Gravitational forces in protoplanetary disks push super-Earths close to stars
- Supercomputer cluster donation helps turn high school class into climate science research lab
- Believing machines can out-do people may fuel acceptance of self-driving cars
- People more likely to trust machines than humans with their private info
- IBM donates system to Penn State to advance AI research
- ICS Seed Grants to power projects that use AI, machine learning for common good
- Penn State Berks team advances to MVP Phase of Nittany AI Challenge
- Creepy computers or people partners? Working to make AI that enhances humanity
- Sky is clearing for using AI to probe weather variability
- ‘AI will see you now’: Panel to discuss the AI revolution in health and medicine
- Privacy law scholars must address potential for nasty satellite data surprises
- Researchers take aim at hackers trying to attack high-value AI models
- Girls, economically disadvantaged less likely to get parental urging to study computers
- Seed grants awarded to projects using Twitter data
- Researchers find features that shape mechanical force during protein synthesis
- A peek at living room decor suggests how decorations vary around the world
- Interactive websites may cause antismoking messages to backfire
- Changing how government assesses risk may ease fallout from extreme financial events
- Differences in genes’ geographic origin influence mitochondrial function
- ICS Affiliate named AGU fellow
- Institute for CyberScience co-hire hunts security flaws in software