BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Mexico/General
BEGIN:DAYLIGHT
DTSTART:20220403T030000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4
TZNAME:CDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20221030T010000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20220711T173043Z
UID:EB87BE6D-99C8-40C8-9B7A-6EAABE4684CE
DTSTART;TZID=Mexico/General:20220707T100000
DTEND;TZID=Mexico/General:20220707T110000
DESCRIPTION:Cyberattacks are constantly ravaging valuable data\, wasting ti
 me and costly resources\, and negatively affecting the reputation of compa
 nies and institutions worldwide. Big\, high profile organizations have suf
 fered the consequences of cyberattacks with high impact on the organizatio
 ns themselves\, their customers\, collaborators\, and society in general. 
 WannaCry and other ransomware software are still a threat that affect comp
 uters\, encrypting data\, and demanding ransom payments in Bitcoin cryptoc
 urrency. Another example\, sophisticated versions of Distributed Denial-of
 -Service attacks (DDoS attacks)\, launched from Internet-connected devices
  -- such as IP cameras\, residential gateways and baby monitors\, cause ma
 jor Internet platforms and services to be unavailable to many users around
  the world. These examples highlight the power and potential of cyberattac
 ks\, revealing a constant improvement and sophistication in attacking stra
 tegies. For sure\, cybersecurity is not anymore what it used to be\; we ar
 e in the era of ubiquitous systems\, we expect more than 75 billion device
 s or smart things connected by 2025. We observe the design of different so
 lutions to tackle this problem\, for instance\, digital passports for seam
 less entry at Dubai Airport\, supported by the blockchain technology\, exp
 ecting it stands as proof of all the transactions on the network. However\
 , how is academia addressing the sophistication in cyberattacks? Are we ab
 le to anticipate the next moves of attackers to protect our information as
 sets? How could academia benefit from the data generated in the network\, 
 to create security intelligence\, and prevent attacks? This talk intends t
 o elicit a discussion around these questions\, and present an overview of 
 correlated researches developed by Dr. Nogueira’s research team\, and fu
 ture directions in these topics.\n\nCo-sponsored by: Instituto Nacional de
  Electricidad y Energías Limpias (INEEL)\n\nSpeaker(s): Michele Nogueira\
 , \n\nVirtual: https://events.vtools.ieee.org/m/316638
LOCATION:Virtual: https://events.vtools.ieee.org/m/316638
ORGANIZER:jvazquez@ineel.mx
SEQUENCE:8
SUMMARY:Data Science for Cybersecurity: An Overview Focused on Networking
URL;VALUE=URI:https://events.vtools.ieee.org/m/316638
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Cyberattacks are constantly ravaging valua
 ble data\, wasting time and costly resources\, and negatively affecting th
 e reputation of companies and institutions worldwide. Big\, high profile o
 rganizations have suffered the consequences of cyberattacks with high impa
 ct on the organizations themselves\, their customers\, collaborators\, and
  society in general. WannaCry and other ransomware software are still a th
 reat that affect computers\, encrypting data\, and demanding ransom paymen
 ts in Bitcoin cryptocurrency. Another example\, sophisticated versions of 
 Distributed Denial-of-Service attacks (DDoS attacks)\, launched from Inter
 net-connected devices -- such as IP cameras\, residential gateways and bab
 y monitors\, cause major Internet platforms and services to be unavailable
  to many users around the world. These examples highlight the power and po
 tential of cyberattacks\, revealing a constant improvement and sophisticat
 ion in attacking strategies. For sure\, cybersecurity is not anymore what 
 it used to be\; we are in the era of ubiquitous systems\, we expect more t
 han 75 billion devices or smart things connected by 2025. We observe the d
 esign of different solutions to tackle this problem\, for instance\, digit
 al passports for seamless entry at Dubai Airport\, supported by the blockc
 hain technology\, expecting it stands as proof of all the transactions on 
 the network. However\, how is academia addressing the sophistication in cy
 berattacks? Are we able to anticipate the next moves of attackers to prote
 ct our information assets? How could academia benefit from the data genera
 ted in the network\, to create security intelligence\, and prevent attacks
 ? This talk intends to elicit a discussion around these questions\, and pr
 esent an overview of correlated researches developed by Dr. Nogueira&amp;rsquo
 \;s research team\, and future directions in these topics.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

