{"id":3378,"date":"2023-10-04T13:35:15","date_gmt":"2023-10-04T17:35:15","guid":{"rendered":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/?page_id=3378"},"modified":"2023-10-26T15:24:22","modified_gmt":"2023-10-26T19:24:22","slug":"october-cybersecurity-awareness-month","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/october-cybersecurity-awareness-month\/","title":{"rendered":"October Cybersecurity Awareness Month"},"content":{"rendered":"<h2>Community Cybersecurity Day for North Philadelphia<\/h2>\n<p><strong>Temple University&#8217;s Digital Equity Center, the Cybersecurity in Application, Research, and Education (CARE Lab), and the Women in Cybersecurity (WiCyS) Temple Chapter<\/strong> have partnered to host a community<strong> Cybersecurity Day<\/strong>!<\/p>\n<p><strong>Event Flyer <a href=\"https:\/\/nam10.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsites.temple.edu%2Fcare%2Ffiles%2F2023%2F10%2FCybersecurity-Day-Flyer-2023.pdf&amp;data=05%7C01%7Cooreofeoluwa.koyejo%40temple.edu%7Ce1b3a628ba364923e77808dbcb547129%7C716e81efb52244738e3110bd02ccf6e5%7C0%7C0%7C638327335764959692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=YCgy3xD9Ff3Q%2F8Ygk8gEuuYV1%2FYl1Eg%2FC3hHgQtaMgc%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">here<\/a><\/strong><\/p>\n<p>Register <strong><a href=\"https:\/\/forms.office.com\/pages\/responsepage.aspx?id=74FucSK1c0SOMRC9Asz25YMOsK0BmOZEuoCLi0Ul3mRUN0oxS1RVR1kxV0xHMTRZODlTUzNQWjBWRC4u\" target=\"_blank\" rel=\"noopener\">here<\/a> <\/strong>to be a part of the cybersecurity day as we discuss Social Engineering, Phishing, Deepfakes\/Artificial intelligence (AI), Staying Safe Online, Digital Footprints, and Online Reputation topics presented by Temple University graduate students.<\/p>\n<p><strong>Sunday, October 29th ||1:00 PM- 4:00 PM || <\/strong><strong>Temple University Digital Equity Center, <\/strong><strong>1915 N. 11th Street, Philadelphia, PA 19122.<\/strong><\/p>\n<hr \/>\n<div>\n<h2 class=\"x_MsoNormal\">Montgomery College Cybersecurity Awareness Month Discussion<\/h2>\n<p class=\"x_MsoNormal\">You are invited to the online talk: <strong>Blue Team Uses of Attack Frameworks <\/strong>By <strong>Prof.\u00a0<span class=\"markby1ulhd5w\" data-markjs=\"true\" data-ogac=\"\" data-ogab=\"\" data-ogsc=\"\" data-ogsb=\"\">David<\/span>\u00a0Vargas<\/strong>, Cybersecurity Professor, Montgomery College Center of Academic Excellence in Cyber<\/p>\n<\/div>\n<p><strong>Description<\/strong>: Organizations are constantly under attack. Attack frameworks are used by cybersecurity professionals to identify and describe intrusions so that they can be more easily identified and\/or prevented. They also provide a common language that makes it possible to better understand the nature of today\u2019s attacks. In this presentation, Prof. <span class=\"markby1ulhd5w\" data-markjs=\"true\" data-ogac=\"\" data-ogab=\"\" data-ogsc=\"\" data-ogsb=\"\">David<\/span>\u00a0Vargas will discuss the two most common attack frameworks used by industry today \u2014 the Lockheed Martin Cyber Kill Chain and MITRE ATT&amp;CK.<\/p>\n<p><strong>Thursday, October 19<sup>th<\/sup>, 2023\u00a0 at 12:00-1:00 PM EST || Cyber Lab, HT230, Germantown campus || <span lang=\"ES-GT\">Online\u00a0Via <a href=\"https:\/\/montgomerycollege.zoom.us\/j\/96183907006\">Zoom<\/a>\u00a0<\/span><\/strong><\/p>\n<p><a title=\"Original URL: https:\/\/mcas-proxyweb.mcas-gov.ms\/certificate-checker?login=false&amp;originalUrl=http%3A%2F%2Fwww.montgomerycollege.edu.mcas-gov.ms%2Fmccyberlab&amp;McasCSRF=1f9133f1b22a2858e34e8ed61e57819de2e9310b838f7dc6f0e06496edb3219b. Click or tap if you trust this link.\" href=\"https:\/\/nam10.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fmcas-proxyweb.mcas-gov.ms%2Fcertificate-checker%3Flogin%3Dfalse%26originalUrl%3Dhttp%253A%252F%252Fwww.montgomerycollege.edu.mcas-gov.ms%252Fmccyberlab%26McasCSRF%3D1f9133f1b22a2858e34e8ed61e57819de2e9310b838f7dc6f0e06496edb3219b&amp;data=05%7C01%7Cooreofeoluwa.koyejo%40temple.edu%7Cb98c83e6072441975fd708dbd032962f%7C716e81efb52244738e3110bd02ccf6e5%7C0%7C0%7C638332687945483646%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=TyrQNR2n7aV16X7RDU6bgqwQZmzjs01DzZvTQkeydvA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"1\">www.montgomerycollege.edu\/mccyberlab<\/a><\/p>\n<hr \/>\n<p><strong>More October Cybersecurity Awareness Month Educational and Informational Resources<\/strong><\/p>\n<h4><strong><a href=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/Screenshot-2023-10-04-at-13.46.20.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3391 \" src=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/Screenshot-2023-10-04-at-13.46.20.png\" alt=\"\" width=\"290\" height=\"115\" \/> <\/a><\/strong><\/h4>\n<h4>More on how to <a href=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/Screenshot-2023-10-04-at-13.46.20.png\">Stay Safe Online<\/a><\/h4>\n<hr \/>\n<h4><a href=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/https___cdn.evbuc_.com_images_609585519_1024867733703_1_original.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3394 size-medium\" src=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/https___cdn.evbuc_.com_images_609585519_1024867733703_1_original-300x110.jpeg\" alt=\"\" width=\"300\" height=\"110\" srcset=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/https___cdn.evbuc_.com_images_609585519_1024867733703_1_original-300x110.jpeg 300w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/https___cdn.evbuc_.com_images_609585519_1024867733703_1_original-768x281.jpeg 768w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/https___cdn.evbuc_.com_images_609585519_1024867733703_1_original.jpeg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/h4>\n<h4>CISA Webinar Series <strong><a href=\"https:\/\/www.eventbrite.com\/cc\/cisa-cybersecurity-awareness-month-2023-2550079\" target=\"_blank\" rel=\"noopener\">Register here<\/a><\/strong><\/h4>\n<hr \/>\n<h4><a href=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/CISA_Logo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3393 \" src=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/CISA_Logo-300x300.png\" alt=\"\" width=\"146\" height=\"146\" srcset=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/CISA_Logo-300x300.png 300w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/CISA_Logo-1024x1024.png 1024w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/CISA_Logo-150x150.png 150w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/CISA_Logo-768x768.png 768w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/CISA_Logo-1536x1536.png 1536w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/CISA_Logo.png 1831w\" sizes=\"auto, (max-width: 146px) 100vw, 146px\" \/><\/a><\/h4>\n<h4>&#8216;Secure Our World&#8217; <a href=\"https:\/\/www.cisa.gov\/cybersecurity-awareness-month#:~:text=Secure%20Our%20World%3A%202023%20and%20Beyond\" target=\"_blank\" rel=\"noopener\">2023 and Beyond<\/a><\/h4>\n<hr \/>\n<h4><i>More to come&#8230;<\/i><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Community Cybersecurity Day for North Philadelphia Temple University&#8217;s Digital Equity Center, the Cybersecurity in Application, Research, and Education (CARE Lab), and the Women in Cybersecurity (WiCyS) Temple Chapter have partnered to host a community Cybersecurity Day! Event Flyer here Register here to be a part of the cybersecurity day as we discuss Social Engineering, Phishing, [&hellip;]<\/p>\n","protected":false},"author":29750,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"full-width-content","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-3378","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/P2CTMC-Su","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/users\/29750"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/comments?post=3378"}],"version-history":[{"count":23,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3378\/revisions"}],"predecessor-version":[{"id":3761,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3378\/revisions\/3761"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/media?parent=3378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}