Skip to main content

System Status: 

Cybersecurity Awareness Events

See the schedule of campus cybersecurity awareness presentations, events, and games.

Privacy 101 Workshop

Thursday, January 13, 9am-12pm
privacy101workshop.jpeg
Campus Privacy Officer, Pegah K. Parsi, talks about privacy issues here on campus and how individuals can best protect themselves and the personal data they handle. It is a prerequisite for any other trainings they offer. 

If you are unable to register through the UC Learning Center, email ucsdprivacy@ucsd.edu to be added to the list. Non-UCSD, please register through Eventbrite.

 


Data Privacy Week is an annual campaign to spread awareness about data privacy and educate individuals on how to secure their personal information. It also works to encourage businesses to respect privacy and be more transparent about how they collect, store and use data. This year, Data Privacy Week 2022, spotlights the value of information and how to “Keep It Private” and “Respect Privacy”.

See how you can participate and learn from privacy experts at events occurring in support of this initiative.

 

UC-CPO-panel-logo.png

 

UC Campus Privacy Officers Film Screening and Panel Discussion

We tweet, we like, and we share — but what are the consequences of our growing dependence on social media? In the documentary film, The Social Dilemma, Silicon Valley insiders reveal how social media is reprogramming civilization by exposing what's hiding on the other side of your screen.

Join the UC Campus Privacy Officers in celebrating Data Privacy Day on January 28, 2022 at noon, with a panel discussion between UC data and privacy experts who will discuss the film, The Social Dilemma, the future of data, what UC’s role should be (if any) in solving the social dilemma, and how viewers can take active steps to better control their data and the data entrusted to them by the UC Community.

Haven’t seen the film? No problem. You can watch the film at home on Netflix, or register for a free screening of the film on Friday, January 14, 2022 at 10am.

Details and Registration Information:

Screening

Friday, January 14, 2022 from 10am-12pm

Register to watch The Social Dilemma

Discussion

Friday, January 28, 2022 12pm-1pm

Register for the panel discussion (panelists will be announced soon)

Data Privacy Day 2022

Wednesday, January 26, 9am-10am on LinkedIn Live
Register here

DPW-2022-Event-Graphic.png

The events of 2020 and 2021 underlined the necessity for data privacy in a big way. So much so, that Data Privacy Day is now Data Privacy Week in order to give the topic the attention it needs. Now in early 2022, the cybersecurity and data privacy community are intensely focused on protecting individuals and organizations from data breach scandals, fragmented data privacy legislation, and misuse of personal information. 

Data Privacy Week 2022, hosted by the National Cybersecurity Alliance and LinkedIn, will convene data privacy experts from industry, government, academia, and non-profit for an afternoon of discussions on hot topics in privacy including:

  • Online tracking
  • Adding privacy to security awareness trainings
  • Designing privacy into systems and corporate culture
  • Data collection for D&I initiatives
  • and more!

How to Break Down Barriers to Privacy Careers for Underrepresented Populations

Thursday, January 26, 11am-12pm
Register here

UC Berkeley hosts a panel discussion among privacy officials from across the UC system and the public sector on how to address the lack of diversity in the Privacy field and how to break down barriers to entry for young professionals of color who are interested in Privacy careers.

#DataPrivacyChat Twitter Chat

Thursday, January 27, 11am-12pm
DataPrivacyChat-Graphic.png
Join @StaySafeOnline for the #DataPrivacyChat Twitter Chat during Data Privacy Week! Share your tips and resources to help individuals manage their data and protect their online privacy.

 

 

Privacy 101 Workshop

Thursday, February 17, 1pm-4pm
Register via UC Learning Center
privacy101workshop.jpeg
Campus Privacy Officer, Pegah K. Parsi, talks about privacy issues here on campus and how individuals can best protect themselves and the personal data they handle. It is a prerequisite for any other trainings they offer. 

If you are unable to register through the UC Learning Center, email ucsdprivacy@ucsd.edu to be added to the list. Non-UCSD, please register through Eventbrite.

 


CAM2021-Email-Signature.png

We hope you were able to attend some of the events throughout October 2021 coordinated by our systemwide UC Cyber Champions team for campus locations to celebrate Cybersecurity Awareness Month. If you missed any, head over to our CSAM events page to find available session recordings, games like Spot the Phish, and additional resources. Keep doing your part to #BeCyberSmart.

Also, reach out to cybersecurity@ucsd.edu and schedule your team to play the Security Feud game or Teams: CyberEscape Online escape rooms from Living Security. You're guaranteed to have fun!


Protecting-Your-Digital-Self_Image.jpg

 

 

 

 

 

 

 

 

Protecting your Digital Self is the webinar series developed by the systemwide UC Cyber Champions Team in 2021. The series features UC Faculty and industry leaders discussing their research and work in areas which may be outside of the traditional cybersecurity landscape, but intersect the digital space and is impacted by cybersecurity.

Protecting Your Digital Self provides an opportunity for UC Faculty, staff, and students to come together virtually for interdisciplinary discussions surrounding information security on a wide range of topics relevant to society as a whole.

Upcoming Events

Preparation for 2022 sessions are underway. Information will appear below and be updated as details are confirmed. We look forward to having you join us!

Table with the events schedule

Past Events

(Recordings provided below as available.)

A Webinar on Digital Equity - Panel Discussion (December 2)

During the week of November 29 to December 3, 2021, UCSC hosted the first ever digital equity week. What is Digital Equity?

Digital Equity is creating equal access technology that enables individuals to participate in society. The five components of digital equity include:

  • Affordable, robust broadband Internet service.
  • Internet-enabled devices that meet the needs of the user.
  • Access to digital literacy training. This means that individuals know how to use and navigate digital software and hardware in a way that supports their needs and use.
  • Quality technical support. If an individual runs into a technical issue, they should have access to help and support to resolve the issue.
  • Applications and online content designed to enable and encourage self-sufficiency, participation and collaboration. 

Do You have the technology you need to be successful?

Panelists included UCSC Alumnus and Founder and Executive Director of Digital NEST, Jacob Martinez, UCSC Chief Information Security Officer, Brian Hall and UCSC Compliance Coordinator, Cecilia Carrillo. The session was moderated by UCSC Student Magdalena Ramirez.

 

Modern Automotive Vulnerabilities: The Science Behind the Fast and the Furious (November 12)

Over the last decade, a range of research has transformed our understanding of automobiles. What we traditionally envisioned as mere mechanical conveyances are now more widely appreciated as complex distributed systems "with wheels". A car purchased today has virtually all aspects of its physical behavior mediated through dozens of microprocessors, themselves networked internally, and connected to a range of external digital channels. As a result, software vulnerabilities in automotive firmware potentially allow an adversary to obtain arbitrary control over the vehicle. Indeed, led by UC San Diego and the University of Washington, multiple research groups have been able to demonstrate such remote control of unmodified automobiles from a variety of manufacturers.

Watch the recording of the discussion in which Stefan Savage highlights how our understanding of automotive security vulnerabilities has changed over time, how unique challenges in the automotive sector give rise to these problems and create non-intuitive constraints on their solutions and, finally, the forces that naturally limit the kinds of automotive attacks seen in the wild. You may also enjoy listening to a conversation with Stefan for the ITS Podcast released November 3.

 

 

Choose Your Own Cybersecurity Adventure: How to get started and succeed in the InfoSec field (October 18)

It's no secret that technology is evolving faster and faster each day. Which means the types of skills and the needs of organizations to protect and secure those technologies is changing just as quickly. Trying to get started in the Information Security or Cybersecurity fields can be difficult, at best, with the ever-changing curriculums and often unreasonable levels of skill being asked for by many hiring managers.

For both students and educators, it can be difficult to know what the most relevant courses are, what topics should be focused on and what additional skills will help position the next generation of security practitioners for success. And this leads to the questions: What area of cybersecurity should I specialize in? How do I demonstrate skill and experience when I'm first interviewing? How do we better prepare students to be successful in their careers? Are there some skills and knowledge that are more in demand than others?

Watch the recording of the discussion where Nathan Wenzler, Chief Security Strategist at Tenable, shared what he's seen work for both educators and students over a 25 year career of mentoring new practitioners and leaders in the cybersecurity field as well as what trends are being seen in the industry for what skills and topics both students and educators should include in their programs to remain relevant for the future. 

 

Cybersecurity: What You Need to Know (May 20)

The May 20 webinar, Cybersecurity: What You Need to Know, featured FBI Agent Elvis Chan and UC San Francisco CISO Pat Phelan. Since an FBI agent presented, the session could not be recorded, however, Agent Chan provided some standard FBI handouts covering common cybersecurity topics, including ransomware.

 

Diversity, Equity, and Inclusion in the Digital Age (April 30)

UC Santa Barbara also hosted the April 30 event, Diversity, Equity, and Inclusion in the Digital Age (Zoom recording), where we had the opportunity to hold a discussion on this vitally important topic with Jessica Robinson, Founder and CEO of PurePoint International. She spoke on why systemic racism poses a threat to cybersecurity infrastructure, the role of leadership and management in cultivating Diversity, Equity and Inclusion (DEI) within the cybersecurity field, and what action items can be taken to highlight the importance of DEI in the digital context.

 

The Credibility of Misinformation (March 5)

UC Santa Barbara opened the series with two great webinars. First, was the March 5 event The Credibility of Misinformation (Zoom recording) moderated by Professor Joseph B. Walther who spoke with Professor Miriam Metzger. These accomplished professors covered the implications of Professor Metzger's research on how individuals perceive misinformation and its sources, and what you can do to protect yourself and your communities from the damaging effects of misinformation.  


General Campus Presentations

LastPass Enterprise at UC San Diego (July 27)

LastPass Enterprise is UC San Diego’s password manager of choice. No more writing down passwords on a sticky note or keeping a spreadsheet on your desktop.

Watch this recording of the live presentation to find out how you can use LastPass to securely manage both your university (e.g. Business Systems, Active Directory) and your personal accounts (e.g. online banking, tax preparation) on all of your devices.

This presentation can also be delivered directly to departmental groups if desired. Contact cybersecurity@ucsd.edu to coordinate your team presentation. 

Fun & Games

On Demand Movie and Videos, User-led & Moderator-led Games brought to us by Living Security

Cinema Event

True-Eye.pngTrue Eye

True Eye is a thriller which follows new-hire, Adrian Bridges, through his first day at a global AI-technology firm. Adrian’s policy orientation and security training quickly spin into suspense and intrigue as his personal AI device, GUIDE, starts asking him to do unethical and even dangerous things with sensitive data. His adventure offers a glimpse into proper operational security, how technology affects people and what we can do about it. See the trailer here.
Watch the full length video (17:54 min.) by yourself or virtually with your team. Bring popcorn and make it an event!
TrueEye-learning.png

Video Modules

CIP - Synthetic Identity Theft from Living Security on Vimeo.

Cyber Hygiene - How to Securely Work from Home during COVID-19

CIP - Vendor Email Compromise from Living Security on Vimeo

Games

CraftAPhish-_Thumbnail.jpg
Determine which emails are phishing or legitimate. Use the information and hints provided to decide if the email is safe.





Zombie-Hotspot-_Thumbnail.jpg
Timed game to locate all security threats or violations in sight. Watch out for zombies!





RawPhish-_Thumbnail.jpg
Game for advanced players who are challenged to locate the malicious phishing emails using only the raw email logs.





Security-Feud-_Graphic.jpgSecurity Feud
Quick on the buzzer? Join us for a fun, immersive security awareness game. Based on the popular game show Family Feud, we will bring two teams together to answer 19 cybersecurity-themed, crowd-sourced questions. It's time for Security Feud! May the best team win!
(Contact cybersecurity@ucsd.edu to schedule your team's play.)

 

 

CyberEscapeOnlineLogo.png

This online team-based cybersecurity training offers two storylines to choose from and creates an engaging gamified experience for all levels of employees. A Virtual Host will lead you in a battle against the clock during CyberEscape Online. Every minute counts! Success (and failure) will depend on your ability to navigate puzzles and uncover clues to identify and locate the insider threat. Choose to collaborate with up to seven teammates, or you could try it on your own. As team completions occur, you can see where you rank on the Leaderboard. Contact cybersecurity@ucsd.edu to schedule your team's play.

CyberEscapeOnline.jpg
All is quiet at Gizmo Corp... it's 40 minutes until doors open on a sunny day everyone usually calls 'payday.' It is a day that may remain unmemorable, despite the fact that every single employee here is getting robbed. Unless... one team of special agents, working feverishly in a dark corner of their security operations center, can find the source of a massive insider breach. You are that team. Good luck.
BS_WebBanner_EE2.png
Jacob Webb has been selected for a top-secret Program that trains new recruits on how to become the world's best cybersecurity operatives. However, first he must pass a test known by the community as the "Entrance Exam."

 

Please be prepared to use the latest version of the supported browsers (Chrome, Microsoft Edge) on a laptop or desktop for both cyber escape rooms.

 

Infographic

Seven Deadly Sins of Working From Home

For more information, contact IT Services Security at cybersecurity@ucsd.edu.