{"id":203750,"date":"2015-02-26T14:13:02","date_gmt":"2015-02-26T14:13:02","guid":{"rendered":"http:\/\/d45h139.public.uconn.edu\/sites\/news\/?p=20170"},"modified":"2025-01-28T21:29:46","modified_gmt":"2025-01-29T02:29:46","slug":"experts-talk-cybersecurity-at-csi-panel-discussion","status":"publish","type":"post","link":"https:\/\/today.uconn.edu\/2015\/02\/experts-talk-cybersecurity-at-csi-panel-discussion\/","title":{"rendered":"Experts Talk Cybersecurity At CSI Panel Discussion"},"content":{"rendered":"<p>Given the fact that the most common password for computer users is \u201cpassword,\u201d and the second most common is \u201c12345,\u201d cybersecurity is an issue for everyone \u2013 not just corporations that handle personal information.<\/p>\n<p>That was the message recently conveyed by a panel of cybersecurity experts hosted by the Center of Excellence for Security Innovation (CSI), a collaboration between UConn School of Engineering and Comcast.<\/p>\n<figure id=\"attachment_20171\" aria-describedby=\"caption-attachment-20171\" style=\"width: 300px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/d45h139.public.uconn.edu\/sites\/news\/wp-content\/uploads\/NIST-7.jpg\"><img decoding=\"async\" class=\"wp-image-20171 size-medium img-responsive lazyload\" data-src=\"http:\/\/d45h139.public.uconn.edu\/sites\/news\/wp-content\/uploads\/NIST-7-300x198.jpg\" alt=\"NIST-7\" width=\"300\" height=\"198\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/198;\" \/><\/a><figcaption id=\"caption-attachment-20171\" class=\"wp-caption-text\">Donna Dodson of NIST (Chris LaRosa\/UConn)<\/figcaption><\/figure>\n<p>Donna Dodson, chief cybersecurity advisor for the National Institute of Standards and Technology (NIST), told the audience at the Wilbur Cross Building that getting companies and individuals to think about cybersecurity is the first step toward a more secure network.<\/p>\n<p>\u201cI may not understand the mechanics of my car, but I know it\u2019s my responsibility to keep it safe,\u201d said Dodson, the featured speaker at the event.<\/p>\n<figure id=\"attachment_20172\" aria-describedby=\"caption-attachment-20172\" style=\"width: 300px\" class=\"wp-caption alignright\"><a href=\"http:\/\/d45h139.public.uconn.edu\/sites\/news\/wp-content\/uploads\/NIST-17.jpg\"><img decoding=\"async\" class=\"wp-image-20172 size-medium img-responsive lazyload\" data-src=\"http:\/\/d45h139.public.uconn.edu\/sites\/news\/wp-content\/uploads\/NIST-17-300x171.jpg\" alt=\"NIST-17\" width=\"300\" height=\"171\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/171;\" \/><\/a><figcaption id=\"caption-attachment-20172\" class=\"wp-caption-text\">left to right: Laurent Michel,, Liam Randall, Steve Mace, Donna Dodson, Mark Tehranipoor and Matthew Scholl (Chris LaRosa\/UConn)<\/figcaption><\/figure>\n<p>Toward that end, the NIST wrote a guidebook for the public, titled \u201cFramework for Improving Critical Infrastructure Cybersecurity.\u201d \u201cIt\u2019s helpful because it provides a common language for people,\u201d she said. \u201cAnd it promotes concepts of resiliency and protecting your environment.\u201d<\/p>\n<p>UConn\u2019s Mark Tehranipoor, Director of CSI, and the Center for Hardware Assurance, Security, and Engineering (CHASE), said education about cybersecurity should begin early. \u201cWe really have to take it down to the undergraduate level and even bring it down to high school level.\u201d<\/p>\n<p>Everyone is needed in the effort to prevent cyberattacks, according to Liam Randall, of Critical Stack, an Ohio-based company that specializes in network security. For every person working on preventing attacks, he said, someone else is working on new ways to\u00a0 carry out such attacks.<\/p>\n<p>\u201cWhen you look at the impact that one person can have, that really keeps me up at night,\u201d he said.<\/p>\n<p>Steve Mace, Associate Vice President for Systems Technology in the Science &amp; Technology Department of the National Cable &amp; Telecommunications Association (NCTA), said the sophistication of cyber-attacks is now \u201cvery high,\u201d so raising the level of counterattacks is all the more crucial.<\/p>\n<p>Panel moderator Dr. Laurent Michel, Associate Professor, UConn Dept. of Computer Science &amp; Engineering and Associate Director of CSI, suggested that today\u2019s cyber-attacks are a combination of ingeniously executed ones and cruder efforts that succeed because of poor security.<\/p>\n<p>As recent attacks against Anthem, Target and Home Depot indicate, the size of a company is no guarantee of security.<\/p>\n<p>\u201cWe\u2019ve seen some smaller companies that are well-versed in controlling their networks, and we\u2019ve seen the opposite with large companies,\u201d said Matthew Scholl,\u00a0Chief of the Computer Security Division, ITL at NIST. \u201cThere\u2019s no correlation between size and cybersecurity.\u201d<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Donna Dodson of NIST was the featured speaker at CSI&#8217;s panel discussion on cybersecurity<\/p>\n","protected":false},"author":122,"featured_media":224098,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","wds_primary_category":0,"wds_primary_series":0,"wds_primary_attribution":0,"footnotes":""},"categories":[1866],"tags":[2496,2497,2498,2499,2500,2501],"magazine-issues":[],"coauthors":[2110],"class_list":["post-203750","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engr","tag-chase","tag-cryptography","tag-cybersecurity","tag-privacy","tag-security","tag-technology"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-05-07 03:57:25","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/203750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/users\/122"}],"replies":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/comments?post=203750"}],"version-history":[{"count":1,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/203750\/revisions"}],"predecessor-version":[{"id":224102,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/203750\/revisions\/224102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media\/224098"}],"wp:attachment":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media?parent=203750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/categories?post=203750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/tags?post=203750"},{"taxonomy":"magazine-issue","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/magazine-issues?post=203750"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/coauthors?post=203750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}