Since 2004, the President of the United States and Congress have declared October to be Cybersecurity Awareness Month, with the goal of helping individuals protect themselves online as threats to technology and confidential data become more commonplace. The University of California Cybersecurity Awareness Month (UCCAM) celebration is a collaborative effort between most UC locations to provide a month of events that will help you stay cyber aware. A full lineup of UC systemwide events is available here. The following events are hosted by UCSB:

The State of Authentication 2022

Wednesday, October 5 from 12-1pm
Presented by Chad Spensky, Founder & CEO of Allthenticate

Chad Spensky, CEO of Allthenticate and security researcher, is passionate about using technology to make people’s lives easier and their digital systems more secure. With over ten years of research experience, a background in solving the Department of Defense’s toughest cyber-security problems at MIT’s Lincoln laboratory, and a Ph.D. from UCSB, Chad remains extremely knowledgeable at Allthenticate, which focuses on identity management and authentication. As a lifetime hacker, Chad uses his academic rigor and soft skills to solve complex real-world cybersecurity problems, like making authentication usable and secure.

View the Presentation Recording here.

Privacy & Cyber Law for All

Monday, October 17 from 12-1pm
Presented by Reema Moussa

This presentation will explore the current legal landscape of the cybersecurity world, the intersections of cybersecurity and privacy law, and key takeaways for technical and non-legal cybersecurity teams to consider in building best practices. Reema, a law student at University of Southern California Gould School of Law and UCSB alumni, will present some currently active laws and precedents to be aware of, as well as take a forward look at relevant cyber, tech, and privacy laws coming down the pipeline. As a former Cybersecurity Awareness Coordinator for UCSB’s Information Security Team and founder of the UCSB Chapter of Women in Cybersecurity, Reema has bridged the gap between technical, legal and management capacities. This will be an interactive session with plenty of time for audience Q&A.

View the Presentation Recording here.

We Like Your Product – Can You Pass Our 26-Page Security Assessment?

Wednesday, October 19 from 12-1pm
Presented by Jon Green, Chief Security Officer at Aruba, a Hewlett Packard Enterprise company

Third-party cybersecurity risk management has become a major priority for nearly everyone, whether mandated by board governance, regulatory requirements, or internal mandates. What does this look like from the vendor side, and how can you best work with your vendors on topics such as internal security controls, SDLC, compliance, and vulnerability management? This presentation will examine the Assurance & Trust program at HPE-Aruba and address how the company commonly deals with security concerns from customers. Jon Green describes himself as a Cybersecurity guy with a technical background in routing, switching, wireless, authentication, PKI, firewalls, and crypto. We will leave plenty of time for Q&A so please bring your questions.

View the Presentation Recording here.

Zoom Security & Awesome New Features

Friday, October 21 from 10-11am
Presented by Giselle Brun, Customer Success Team Lead, Higher Education at Zoom

It has been another year of utilizing Zoom as our primary communication tool across the UC System. Giselle Brun from Zoom will discuss some of Zoom’s new advanced security features & best practices to demonstrate how to effectively use them to keep your meetings safe and secure. In addition, she will explore some awesome new features and how to incorporate them successfully into your Zoom sessions.

View the Presentation Recording here.

Human Hacking & Social Engineering

Wednesday, October 26 from 12-1pm
Presented by Chad Spensky, Founder & CEO - Allthenticate

Human hacking or Social Engineering in the context of IT Security is “any act that influences a person to take actions that or may not be in their best interest.” It is often a confidence trick done to obtain access to systems and confidential data that can be part of a bigger scheme. It is still on the rise and is now the number one cause of breaches. Join this insightful conversation to learn more about this topic.

View the Presentation Recording here.