News
One 2025 grad got a taste of journalism history—and its future—at a live broadcast of Good Night and Good Luck, the hit ...
Course Details. Community Consulting for Young Changemakers June 23-27, 2025, 9:30 a.m.-3:30 p.m. Rose Hill Campus Instructor: Greg Van Kirk. Course Number: SULA 0116 RP1 ...
Leaders are communicators. Their ability to convey intentions through the written word sets them apart from their peers. This course will teach students how to use their personal history to benefit ...
The University Managed Print Services (UMPS) program goal is to modernize our print fleet to bring operational costs into alignment with operational needs while providing additional benefits, ...
Moderator: Koji Nakao, Distinguished Researcher, National Institute of Information and Communication Technology (NICT), Tokyo, Japan With the rapid proliferation of IoT devices as critical edge ...
Moderator: Peter Marta, Partner, Goodwin Procter, LLP. This panel will delve into the multifaceted and evolving threat posed by North Korean (DPRK) remote IT workers, who are increasingly exploited by ...
Principal Director of the Cyber Academic Engagement Office within the Department As the demand for skilled professionals in cybersecurity and artificial intelligence (AI) continues to grow, bridging ...
Moderator: Brett Leatherman, Assistant Director for Cyber, FBI. Over the past 18 months China’s cyber activity has accelerated, and the “Typhoons”—Volt, Flax, Salt, and Silk—demonstrate how private ...
Moderator: Evan Perez, Senior Justice Correspondent, CNN. Incident response is no longer just about damage control and victim notifications. In today’s threat landscape, where attacks are increasingly ...
Ph.D., Department of Politics, New York University, May 1970 MA, Department of Politics, New York University, May 1967 AB, Department of Political Science, Ohio Wesleyan University, May 1964 Summer ...
Moderator: Matthew Knight, VP of Security Products, OpenAI In just a few short, disruptive years, AI has evolved from an experimental novelty to a foundational tool for cybersecurity teams. As ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results