The Department of Computer Science at the University of Maryland and the Center for Women in Computing are pleased to present the second year of Tech + Research: Welcoming Women to Computing Research. This is a three day research workshop geared towards engaging undergraduate women in computing. During this workshop, student teams will come together and collaboratively work together to use technology to solve pressing issues.
Parallel to Technica, the largest all-women and non-binary hackathon in the nation, students will participate in the Research track at Technica The weekend event will bring together computing faculty from institutions across the state of Maryland to serve as mentors on projects in their research areas. Along with providing hands-on research experience in a dynamic hackathon setting, the weekend workshop will include sessions introducing attendees to the basics of computer science research (CSR) and highlight the exciting opportunities that come with pursuing a graduate degree in computer science.
Who Can Attend?
We welcome all women undergraduates from colleges and universities to apply. Current master’s students considering a PhD program may apply and will be considered on a case by case basis. Please apply by October 15th for best consideration. Applications will be accepted until Wednesday, October 23th if space is still availible.
Registration Process and Fees
Participants will have two options to experience this workshop.
- Students who live more than 15 miles away from College Park, MD will be provided housing.
- Students who live on or near the UMD campus (less than 15 miles away from College Park, MD) will not be provided housing.
Housing does not include Sunday, 11/10/19. Students are expected to check out Sunday morning before programming.
All meals, snacks, and supplies will be provided for both groups from Friday morning breakfast through Sunday lunch. Students are responsible for their own transportation to and from UMCP.
REMEMBER: YOU MUST REGISTER FOR BOTH TECHNICA & TECH + RESEARCH
For full information, please visit https://inclusion.cs.umd.edu/events/techresearch.
Technica is the world’s largest all-women and nonbinary hackathon, hosted annually at the University of Maryland.
Over the duration of 24 hours, women and non-binary people are immersed in tech culture and encouraged to exercise their imagination to create interesting and innovative hacks.
This year’s theme is “Go Beyond”. At Technica, we want to see women and non-binary folks thrive and go beyond society’s expectations for them. We encourage all attendees to take your tech journey beyond Technica. Don’t stop at our hackathon, attend others and keep creating. Technica is meant to catapult you further in your career, and help you to continue achieving. As you advance in your career, go beyond your duties at work, become a mentor and help to advance the next generation of women in tech. Whatever your goals and aspirations, remember you can always #GoBeyond.
Register as a Hacker – Come build using hardware, software, or anything you want with other hackers! You don’t have to know how to code to be a hacker. Hackers can be students, designers, or just any tech-lover out there!
Points – 50
Join us for a half-day of food, drinks, and educational sessions on the Microsoft suite of products. Get updated by our team of experts on the new solutions coming from Microsoft and how they can be incorporated into your IT infrastructure.
12:00 PM – 1:00 PM | Registration & Lunch
1:00 PM – 2:30 PM | Windows10 VDI on Azure Session
2:30 PM – 2:45 PM | Coffee Break
2:45 PM – 4:45 PM | Microsoft Azure Sentinel & Security Session
4:45 PM – 6:00 PM | Networking Reception
During these custom sessions, we will be discussing:
- – An introduction to Windows10 VDI through a live demo
- – Azure: Microsoft’s leading cloud platform
- – The various Azure tools that keep your cost and time down
- – A breakdown of cloud security, in respects to Azure
- – A live demo on Azure Sentinel
Are you interested in working in the finance industry but not sure if it’s the right path for you? Next February, join us at SIG to learn more about what a day in the life looks like across our trading, finance, technology, and operations teams. Throughout the day you’ll get to learn about what our teams do, how options trading works, and will get a sense of our unique culture and work environment.
What we’re looking for
This opportunity is open to women who are planning to graduate in the winter of 2021 or the spring of 2022. We are looking for students with a background and interest in any of the following fields/majors:
- Math/Applied Math
- Computer Science/Engineering
- Information Technology
- Systems Engineering /Networking/Security
Please submit your resume in order to be considered for the program.
As our team continues to develop strategies for supporting the next wave of tech leaders, we have been innovating – building ways to keep everyone safe, while providing much-needed spaces for us to convene and focus on solutions to diverse and inclusive leadership, product design, and culture.
That’s why we are excited to be hosting the Tech Inclusion Global Summit: The Next Wave of Leadership!
Instead of our in-person New York Summit planned for Spring 2020, Tech Inclusion will host a global virtual summit to connect the next wave of tech leaders from all over the world.
Join us on May 12, 2020 for a fully virtual summit experience as we discuss Leadership & Professional Growth, Allyship & Culture, Emerging Industry Trends, The Future of Work, and more.
Welcome To The Global Summit Experience
Paths to Technical Leadership
Leadership & Professional Growth Solo Talks
Envisioning The Future of Work
Interactive Session: Allyship & Inclusive Cultures
Hiring The Next Wave of Tech Talent
What’s Next in Tech?
Closing and Next Steps
Audit, Risk, and Compliance departments want to use automation to reduce costs, create efficiencies and enhance their value proposition to the business when managing risk; however, they do not have the internal capabilities to execute. Monitoring controls and control testing are often inefficient, expensive, and burdensome for organizations; however, many organizations do not have the internal capabilities to shift from a manual approach (susceptible to human error, with manual labor costs, and significant limitations on outcomes given the sub-sets of data used for controls /testing samples) to an automated approach. Our methodology and objective is to bring an automated continuous monitoring service offering to market, in order to help our clients identify their business case so that they are able to realize the benefits of control test automation in today’s market.
Don’t miss the GraphQL event of the year! Developers, software architects, and product leaders will gather together online from all over the world to learn, discuss, and advance GraphQL best practices.
We will be splitting the content across two weeks to help prevent screen time burnout. GraphQL Summit Worldwide will take place on July 30-31 and August 6-7, 2020.
Attendees will have access to 3-4 hours of interactive talks and panels each event day from experts in the GraphQL community. As always, we’ll create multiple environments for attendees to network with each other and meet GraphQL leaders.
Are your work-from-home personnel putting the information they access at risk? Do they comply with your organization’s security and privacy requirements within home offices? Where are hidden digital spies who can access business data in home offices?
Rebecca Herold, CEO of The Privacy Professor, and author of the new CRC Press book, “Security & Privacy when Working from Home & Travelling,” will describe what she has learned in 25+ years of being an information security and privacy leader, and what her research into these issues teaches all organizations about how to effectively manage information security and privacy risk management in work-from-home situations.
Understanding your assets is the foundation of cybersecurity, right? So then why is asset management still such a monster of a problem? As IT environments become increasingly complex, teams are struggling to keep up.
We are spending millions of dollars on security solutions, but we cannot even validate that they are deployed and functioning like they ought to. It is a nightmare…but it does not have to be.
Join us for Mastering Cybersecurity Asset Management — Once and For All, a free webinar hosted by Andrew Senko, Sr. Security Engineer at Axonius.
Andrew will cover why it’s more important than ever to have a foundational understanding of the assets in your environment.
RSVP now to learn:
- Why cybersecurity asset management is at the top of CISOs’ priorities
- The massive challenge that comes with aggregating disparate data sets
- How tools built specifically for cybersecurity asset management are helping real teams at real org
Enterprise organizations exist to provide products, services, and value to the communities they serve. Whether public or private, government or military, non-profit, or profit-making, all enterprises need to deliver on their goals and objectives. Risk can impede the enterprise’s ability to be successful in meeting their mission.
Today, more than ever, our dependence on the intangible digital domain, information and technology assets, and virtual connectivity make managing risk of all types critically important.
Join us for this webinar on 12 August and learn more about:
- Risk is ubiquitous, that’s why risk identification is a vital step
- The risk thread and how it connects to cyber, information security, audit, governance, etc.
- How to think about managing the different types of risks that enterprises face