What we offer
From time to time, UCSF IT Security hosts authoritative speakers on important IT security topics as well as other educational events. Whenever possible, we record the meeting so that the content is available for future viewing.
10/8/20 Barrett Lyon Presents: Understanding Security Through Visualization of the Metaphysical
Speaker: Barrett Lyon
Technologists are leveraging art in a way that gives visual learners the ability to do their job better. The internet - the largest network of all - is abstract and hard to visualize. But it has been made more visually approachable by the Opte Project, an open-source initiative to create a visual representation of the metaphysical spaces of the internet. To view the presentation, click here.
10/6/20 Q&A with SANS Director of Emerging Security Trends, John Pescatore
Speakers: John Pestacore and Ken Newton
SANS’ John Pescatore highlighted the top 3 security issues hitting organizations in 2020/2021. Ken Newton, UCSF IT Security Operations Manager, asked questions to drill down in areas of interest in particular to the USCF community. To view the presentation, click here.
Overview of the UCSF IT Security Vulnerability Management Program and How it Works
Speakers: Ken Newton and John Emery
Ken Newton, UCSF Information Security Operations Manager, gave an overview of the UCSF IT Security Vulnerability Management Program, followed by John Emery, the Radiology Infrastructure Administrator, who explained how it was successfully implemented in his department. Ken explained that the success of a program is not just having the vulnerability management tools, but also using the proper infrastructure and the right level of participation. John went on to speak about how critical vulnerability management is to his department, what it took to put the program into place and how it continues to work. To view the presentation, click here.
10/8/19 Secure Cloud Transformation: How Zero Trust Networking Is Enabling Secure Infrastructure
Speaker: Richard Stiennon
Every organization is on its own journey to the cloud. The first phase, adaptation of Software as a Service (SaaS), quickly leads to application transformation. As more and more traffic heads to the internet and cloud-hosted apps, network bottlenecks occur that drive network transformation. A security layer is required to make all of this work.
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,200 vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Secure Cloud Transformation: The CIO’s Journey (IT-Harvest Press 2019) and Washington Post Bestseller, There Will Be Cyberwar. He writes for Forbes, CSO Magazine and The Analyst Syndicate.
To view the presentation, click on this link: richard_stiennon.mp4
10/30/18 When IoT Attacks - Understanding the Safety Risks Associated with Connected Devices
Speaker: Billy Rios
Billy is the founder of WhiteScope LLC, a startup focused on embedded-device security. Billy is recognized as one of the world’s most respected experts on emerging threats related to Industrial Control Systems (ICS), Critical Infrastructure (CI) and medical devices. He has discovered thousands of security vulnerabilities in hardware and software supporting ICS and critical infrastructure. Billy has also worked at Google, where he led the front-line response for externally reported security issues and incidents. Prior to Google, Billy was the Security Program Manager at Internet Explorer (Microsoft). This presentation is part of UCSF's 2018 celebration of National Cybersecurity Awareness Month (NCSAM).
To view the video, click on this link: billy_rios_0.mp4
1/17/18 Cyber Champion Partners Presents - Cybersecurity Checkup: Best Practices for Maintaining Security and Privacy for You and Your Family
Speaker: Sam Horowitz, UCSB CISO
Cybersecurity isn't just for information technology professionals. Computers and the internet are a daily part of life. We all have a role to play to protect cyberspace. In the checkup, we reviewed a checklist of items to make sure that your practices are secure. Along with other topics, we discussed mobile device security, wireless, social media and what to do if you're hacked. We encourage you to consult the checklist linked below and provide checkup meetings with members of your family, friends and co-workers. Together, we can make cyberspace a safer place for everyone, one person at a time.
To view a copy of the checklist, click here.
10/19/16 Medical Device Cybersecurity: FDA Perspective
Speaker: Dr. Suzanne Schwartz
UCSF IT Security hosted a webinar by Suzanne Schwartz, MD, MBA, Associate Director for Science & Strategic Partnerships at FDA’s Center for Devices and Radiological Health (CDRH). Among other public health concerns, her portfolio has most notably included medical device cybersecurity, for which she chairs CDRH’s Cybersecurity Working Group. She also co-chairs the Government Coordinating Council for Healthcare & Public Health critical infrastructure sector.
To watch the video, click here.
10/13/16 Cybersecurity for Connected Medical Devices
Speaker: Dr. David Klonoff
UCSF IT Security hosted a webinar by Dr. David Klonoff, an endocrinologist specializing in diabetes technology. He is Clinical Professor of Medicine at UCSF and Medical Director of the Dorothy L. and James E. Frank Diabetes Research Institute of Mills-Peninsula Health Services in San Mateo, California. He founded DTSec (Diabetes Technology Cybersecurity Standard for Connected Diabetes Devices Program), which created the world’s first consensus medical device cybersecurity standard.
To watch the video, click here.
10/3/16 Surviving Social Engineering and Ransomware Attacks
Speaker: Stu Sjouwerman
UCSF IT Security hosted a webinar by Stu Sjouwerman, founder and CEO of KnowBe4, Inc., a multiple award-winning anti-malware software company. His presentation explained how attackers are moving their focus from attacking the hardened network perimeter to attacking end-users. He discussed the ransomware and CEO fraud epidemics and proven methods of protecting an organization against these phishing-based attacks.
To view the PowerPoint presentation, click on the link: knowbe4-ransomeware-presentation.pptx
10/28/15 Cyber Security for Medical Devices Webinar
Speaker: Dr. Kevin Fu
UCSF IT Security hosted a webinar by Kevin Fu, a pioneer in the field of medical device security. Kevin is Chief Scientist of Virta Labs, Inc., and Associate Professor in EECS at the University of Michigan, where he directs the Archimedes Center for Medical Device Security and the Security and Privacy Research Group (SPQR). He drew on material from research in software engineering and trustworthy computing, public FDA data and accident reports to provide a high-level understanding of the issues surrounding the risks and benefits of medical device software.
To watch the video, click here.