fbpx
Contact Us Apply

Events

Cybersecurity Workshop

Cybersecurity Workshop

When

February 29, 2020    
9:00 am - 3:00 pm

Where

Penn Highlands Richland
101 Community College Way, Johnstown, PA, 15904

Event Type

Loading Map....

Presenter: Jeff Pulcini, Agile Coach and Project Manager

Title: Introduction to the Agile Mindset and Scrum Methodology

Description: Agile is a mindset and Scrum is perhaps the most popular methodology or framework employed. The goal of this interactive session is to introduce Agile as a philosophy, Scrum as a methodology/framework, the roles of those on the Scrum Team, and the ceremonies that are part of the process. Along the way, we’ll talk about how Agile differs from conventional methodologies and the benefits it brings.

Visit IUP’s website for additional information.

Location: B112 & B120

Proudly Sponsored by: Pennsylvania Highlands Community College, Indiana University of Pennsylvania, and the Department of Defense

Participation Advantages

  • Student participants receive a Raspberry Pi 4 Starter Kit with Fan Cooled Case.
  • Faculty participants receive a $500 stipend.

Registration Information

Please email CyberWS@pennh.25comm.com. An auto-reply will have further information about the event, as well as a Google Form to register.

Additional Date: March 7, 2020

Presenter: Nigel Wright, Technical Program Manager, Uber

Title: Methods to Decompose and Address System Cyber Security Threat Risks

Description: Attendees will discuss ways to review an overall system, such as Hospital IT Infrastructure, Rail Signaling System, or Autonomous Vehicle, and evaluate the risks both present inherent operation and vulnerable to malicious attack. Explore common industry cybersecurity attacks such as Stuxnet, the Tesla lane monitoring system hack, and others. There will also be an exercise reviewing a hypothetical physical/digital system (such as an Airport Security Theoretical System Design), An overview of Kanban processes for program management will be provided. Finally, attendees will separate into three to four groups and use this mechanism (using “t-shirt sizing” planning with post-it notes) to evaluate how to prioritize development to mitigate cybersecurity risks.