{"id":27294,"date":"2022-10-27T10:22:35","date_gmt":"2022-10-27T14:22:35","guid":{"rendered":"https:\/\/tech.msu.edu\/?post_type=tribe_events&p=27294"},"modified":"2022-10-27T10:22:35","modified_gmt":"2022-10-27T14:22:35","slug":"msu-it-research-security-presentation-and-workshop","status":"publish","type":"tribe_events","link":"https:\/\/tech.msu.edu\/event\/msu-it-research-security-presentation-and-workshop\/","title":{"rendered":"MSU IT Research & Security Presentation and Workshop"},"content":{"rendered":"<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"33\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Tuesday, November 15, 2022, at 11:00 a.m. at the MSU Union Ballroom<\/span><\/b><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"33\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><a href=\"https:\/\/www.eventbrite.com\/e\/msu-it-research-security-presentation-and-workshop-tickets-446237156347\"><b><span data-contrast=\"none\">Register here<\/span><\/b><\/a><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"33\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><b><span data-contrast=\"none\">All Spartans interested in research cybersecurity are welcome!<\/span><\/b><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Special guest Chief Information Security Officer Mike Corn, UC San Diego, and CISO Tom Siu, MSU, discuss cybersecurity trends in the research space. All Spartans who work or are interested in cybersecurity or academic research are welcome to attend. Attendees who RSVP by 5 p.m. Friday, November 11 will receive a boxed lunch.<\/span><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\"><br \/>\n<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Join us on Tuesday, November 15 at the MSU Union Ballroom:<\/span><\/b><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"7\" data-aria-level=\"1\"><span data-contrast=\"auto\">11:00 \u2013 11:45 a.m. <\/span><b><span data-contrast=\"auto\">Research & Security Presentation by Mike Corn<\/span><\/b><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"8\" data-aria-level=\"1\"><span data-contrast=\"auto\">11:45 a.m. \u2013 12:15 p.m. <\/span><b><span data-contrast=\"auto\">Lunch <\/span><\/b><span data-contrast=\"auto\">(RSVP by 11\/11 for a boxed lunch)<\/span><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">12:15 \u2013 1:00 p.m. <\/span><b><span data-contrast=\"auto\">CMMC Research Workshop<\/span><\/b><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">Workshop is designed for researchers, particularly those affected by security mandates in research contracts\/grants.<\/span><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">Mike and Tom discuss the Cybersecurity Maturity Model Certification (CMMC) from the perspective of the academic advisory council and where research organizations should prepare and focus their effort.<\/span><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">Mike will present insight and lessons learned at UCSD.\u00a0<\/span><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"\uf0b7","469777815":"hybridMultilevel"}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">Attendee participation during the discussion is encouraged.<\/span><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b><i><span data-contrast=\"auto\">Speaker Biographies<\/span><\/i><\/b><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Mike Corn<\/span><\/b><span data-contrast=\"auto\"> is the CISO of the University of California at San Diego, where he manages the Security Office and Identity and Access Management. His areas of interest include privacy, identity management, and cloud services. He has been an active speaker and author on security and privacy and has participated in numerous Educause and Internet2 initiatives.\u00a0<\/span><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">He is a member of the Internet2 NAOPag, a past co-chair of the Educause HEISC, a member of the REN-ISAC steering committee, and the CMMC AB Academic Advisory Council. Before joining UCSD, he was the CISO & CPO and Deputy CIO of Brandeis University. He was formally the CISO and Chief Privacy and Security Officer of the University of Illinois at Urbana-Champaign. He graduated from the University of Colorado at Boulder and the University of Illinois at Urbana-Champaign.<\/span><span data-ccp-props=\"{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Tom Siu<\/span><\/b><span data-contrast=\"auto\">\u202fleads\u202fMSU\u2019s Security\u202fEngineering, Security Operations, Incident\u202fResponse, and Governance, Risk, and Compliance teams within the Information Security\u202fdepartment\u202fand\u202fis responsible for\u202fthe university-wide\u202finformation security strategy. Tom joined MSU in 2020 after having served for 14 years as\u202fCISO for Case Western Reserve University,\u202fwhere he oversaw the development of the information security program, helped in the centralization of IT under the University Technology, [U] Tech, brand, and organized the multiple institutional partnerships for the CWRU secure research environment, and the 2020 Presidential Debate in Cleveland. <\/span><span data-ccp-props=\"{"201341983":0,"335559740":259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tuesday, November 15, 2022, at 11:00 a.m. at the MSU Union Ballroom\u00a0 Register here\u00a0 All Spartans interested in research cybersecurity are welcome!\u00a0 Special guest Chief Information Security Officer Mike Corn, UC San Diego, and CISO Tom Siu, MSU, discuss cybersecurity trends in the research space. All Spartans who work or are interested in cybersecurity or… <a class=\"excerpt-read-more\" href=\"https:\/\/tech.msu.edu\/event\/msu-it-research-security-presentation-and-workshop\/\" title=\"Read MSU IT Research & Security Presentation and Workshop\">Read more »<\/a><\/p>\n","protected":false},"author":79,"featured_media":27190,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false},"tags":[216,83],"tribe_events_cat":[6],"acf":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/tribe_events\/27294"}],"collection":[{"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/comments?post=27294"}],"version-history":[{"count":1,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/tribe_events\/27294\/revisions"}],"predecessor-version":[{"id":27295,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/tribe_events\/27294\/revisions\/27295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/media\/27190"}],"wp:attachment":[{"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/media?parent=27294"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/tags?post=27294"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/tribe_events_cat?post=27294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}