[et_pb_section fb_built=”1″ admin_label=”Hero Section” _builder_version=”3.0.84″ use_background_color_gradient=”on” background_color_gradient_start=”#ff6a88″ background_color_gradient_end=”#ff99ac” background_color_gradient_direction=”131deg” custom_padding=”100px|0px|100px|0px” animation_style=”slide” animation_direction=”top” animation_intensity_slide=”2%” animation_starting_opacity=”100%”][et_pb_row use_custom_width=”on” custom_width_px=”1440px” padding_top_2=”40px” _builder_version=”3.0.83″][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_image src=”http://cis.bentley.edu/sandbox/wp-content/uploads/birgy.jpg” show_bottom_space=”off” always_center_on_mobile=”off” disabled_on=”on|on|off” _builder_version=”3.19.7″ animation_style=”slide” animation_direction=”right” animation_intensity_slide=”6%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.47″ padding_top=”40px” parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.83″ text_font=”||||||||” header_font=”Playfair Display|700|||||||” header_text_color=”#ffffff” header_font_size=”60px” header_line_height=”1.5em” header_2_font=”||||||||” header_3_font=”||||||||” header_4_font=”||||||||” header_5_font=”||||||||” header_6_font=”||||||||” custom_margin=”||20px|” locked=”off”]
Come learn about CyberSecurity from Dr. Birgy Lorenz
[/et_pb_text][et_pb_divider color=”#f7d584″ divider_weight=”3px” height=”10px” disabled_on=”on|on|off” _builder_version=”3.2″ max_width=”80px” module_alignment=”left” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”3.0.83″ text_font=”Poppins||||||||” text_text_color=”rgba(255,255,255,0.8)” text_font_size=”18px” text_line_height=”1.8em” header_font=”||||||||” locked=”off”]
Dr Birgy Lorenz
Tallinn University of Technology (TalTech), Estonia
Fulbright scholar
BIO: Birgy Lorenz is a scientist that focuses on her work on human aspects of cybersecurity and laypersons cybersecurity and digital safety competencies. She has been an informatics teacher and IT manager for 17 years, worked at lecturer 14 years, developed Estonian curricula for cybersecurity from basic school to high school. She works also with talents (young hackers) to improve their skills (both technical and social) through different cyber exercises/events (project CyberOlympic). She is interested in cybersecurity competencies development and gamification possibilities to train students, talents and society + develop models around that, digital safety awareness possibilities and teacher education (IT and cyber competencies of the teachers/trainers/lecturers).
Her CV https://www.etis.ee/CV/Birgy_Lorenz/est?lang=ENG&tabId=CV_ENG
Portfolio of links http://birgylorenz.dropmark.com/
In her Fulbright US adventure, she will be presenting her game of CyberSecurity Stories, what is used to talk about the funny and crazy thing that happens in cyber realms.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Hero Section” _builder_version=”3.0.84″ use_background_color_gradient=”on” background_color_gradient_start=”#ff6a88″ background_color_gradient_end=”#ff99ac” background_color_gradient_direction=”131deg” custom_padding=”100px|0px|100px|0px” animation_style=”slide” animation_direction=”top” animation_intensity_slide=”2%” animation_starting_opacity=”100%”][et_pb_row use_custom_width=”on” custom_width_px=”1440px” padding_top_2=”40px” _builder_version=”3.0.83″][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_image src=”http://cis.bentley.edu/sandbox/wp-content/uploads/cybersec.png” show_bottom_space=”off” always_center_on_mobile=”off” disabled_on=”on|on|off” _builder_version=”3.19.7″ animation_style=”slide” animation_direction=”right” animation_intensity_slide=”6%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.47″ padding_top=”40px” parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.83″ text_font=”||||||||” header_font=”Playfair Display|700|||||||” header_text_color=”#ffffff” header_font_size=”60px” header_line_height=”1.5em” header_2_font=”||||||||” header_3_font=”||||||||” header_4_font=”||||||||” header_5_font=”||||||||” header_6_font=”||||||||” custom_margin=”||20px|” locked=”off”][/et_pb_text][et_pb_divider color=”#f7d584″ divider_weight=”3px” height=”10px” disabled_on=”on|on|off” _builder_version=”3.2″ max_width=”80px” module_alignment=”left” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”3.0.83″ text_font=”Poppins||||||||” text_text_color=”rgba(255,255,255,0.8)” text_font_size=”18px” text_line_height=”1.8em” header_font=”||||||||” locked=”off”][/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”About Us ” _builder_version=”3.0.78″ custom_padding=”200px|0px|60px|0px”][et_pb_row custom_padding=”|||” custom_margin=”|||” use_background_color_gradient_1=”off” use_background_color_gradient_2=”on” background_color_gradient_start_1=”#ff6a88″ background_color_gradient_start_2=”#9599e2″ background_color_gradient_end_1=”#ff99ac” background_color_gradient_end_2=”#8bc6ec” background_color_gradient_direction_1=”35deg” background_color_gradient_direction_2=”115deg” background_color_gradient_end_position_1=”100%” padding_right_1=”60px” _builder_version=”3.0.83″ module_alignment=”center”][et_pb_column type=”1_2″ _builder_version=”3.0.47″ padding_right=”60px” parallax=”off” parallax_method=”on” use_background_color_gradient=”off” background_color_gradient_start=”#ff6a88″ background_color_gradient_end=”#ff99ac” background_color_gradient_direction=”35deg” background_color_gradient_end_position=”100%”][et_pb_text _builder_version=”3.0.83″ text_font=”||||||||” header_font=”||||||||” header_text_align=”left” header_text_color=”#2b2b2b” header_line_height=”1.3em” header_2_font=”Playfair Display|700|||||||” header_2_text_align=”left” header_2_text_color=”#2b2b2b” header_2_font_size=”42px” header_2_line_height=”1.5em” text_orientation=”center” module_alignment=”center” custom_margin=”||10px|”]
CyberSecurity Stories February 19th @2pm in Smith 234
[/et_pb_text][et_pb_divider color=”#f7d584″ divider_weight=”3px” height=”10px” disabled_on=”on|on|off” _builder_version=”3.2″ max_width=”80px” module_alignment=”left” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”3.0.83″ text_font=”Poppins||||||||” text_text_color=”rgba(0,0,0,0.4)” text_font_size=”16px” text_line_height=”1.9em” header_font=”||||||||” header_2_font=”||||||||” module_alignment=”center” custom_margin=”||30px|”]
On 19th February (Cyber Sec Stories) – will play a game of Cyber Sec Stories. The game is developed me and my university students. We also discuss what are the minimal cybersecurity skills needed to function in the world today (at home, at work, in a society). Workshop will be interactive and everyone can share their ideas and stories.
Fun video about the topic: https://www.youtube.com/watch?v=opRMrEfAIiI
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on” use_background_color_gradient=”on” background_color_gradient_start=”#9599e2″ background_color_gradient_end=”#8bc6ec” background_color_gradient_direction=”115deg”][et_pb_image src=”http://cis.bentley.edu/sandbox/wp-content/uploads/d2.jpg” align=”center” always_center_on_mobile=”off” _builder_version=”3.19.7″ box_shadow_style=”preset3″ box_shadow_horizontal=”13px” box_shadow_vertical=”42px” box_shadow_blur=”45px” box_shadow_spread=”-3px” box_shadow_color=”rgba(0,0,0,0.1)” custom_margin=”-40px|40px|40px|-40px” custom_padding=”|||” animation_style=”zoom” animation_direction=”right” animation_intensity_zoom=”6%” animation_starting_opacity=”100%” url=”https://www.youtube.com/watch?v=opRMrEfAIiI”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Collections” _builder_version=”3.0.78″ custom_padding=”60px|0px|120px|0px”][et_pb_row custom_padding=”0px||0px|” custom_margin=”||200px|” make_equal=”on” use_background_color_gradient_1=”on” background_color_gradient_start_1=”#ff6a88″ background_color_gradient_end_1=”#ff99ac” background_color_gradient_direction_1=”35deg” background_color_gradient_end_position_1=”100%” padding_top_2=”40px” padding_right_1=”5%” padding_right_2=”40px” padding_bottom_2=”40px” padding_left_1=”5%” padding_left_2=”40px” _builder_version=”3.0.84″ box_shadow_style=”preset3″ box_shadow_vertical=”40px” box_shadow_blur=”50px” box_shadow_color=”rgba(0,0,0,0.1)” module_alignment=”center”][et_pb_column type=”1_2″ _builder_version=”3.0.47″ padding_left=”5%” padding_right=”5%” parallax=”off” parallax_method=”on” use_background_color_gradient=”on” background_color_gradient_start=”#ff6a88″ background_color_gradient_end=”#ff99ac” background_color_gradient_direction=”35deg” background_color_gradient_end_position=”100%”][et_pb_image src=”http://cis.bentley.edu/sandbox/wp-content/uploads/download1.jpg” align=”center” _builder_version=”3.19.7″ custom_margin=”-20px||-20px|” custom_padding=”|||” animation_style=”zoom” animation_direction=”left” animation_intensity_zoom=”10%” animation_starting_opacity=”100%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.47″ padding_bottom=”40px” padding_left=”40px” padding_right=”40px” padding_top=”40px” parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.83″ header_font=”||||||||” header_3_font=”Playfair Display|700|||||||” header_3_text_color=”#2b2b2b” header_3_font_size=”28px” header_3_line_height=”1.5em” custom_margin=”||10px|”]
How to Hack Through Search March 5th @2pm in Smith 234
[/et_pb_text][et_pb_divider color=”#f7d584″ divider_weight=”3px” height=”10px” disabled_on=”on|on|off” _builder_version=”3.2″ max_width=”80px” module_alignment=”left” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”3.0.83″ text_font=”Poppins||||||||” text_text_color=”rgba(0,0,0,0.4)” text_font_size=”16px” text_line_height=”1.9em” header_font=”||||||||” header_2_font=”||||||||” module_alignment=”center” custom_margin=”||30px|”][/et_pb_text][et_pb_text _builder_version=”3.0.83″ text_font=”Poppins||||||||” text_text_color=”rgba(0,0,0,0.4)” text_font_size=”16px” text_line_height=”1.9em” header_font=”||||||||” header_2_font=”||||||||” module_alignment=”center” custom_margin=”||30px|”]
On 5th March (How to hack through search) – will look into open source intelligence that means we hack using our internet search skills. There is data everywhere and hackers have lot of time to gather it and construct a plan for attack. I will introduce different tools and ways to do it form the fake profiles to looking into ones sleeping patterns etc. Will discuss also ethics around being a white, gray and black hat and why one should know about common internet fraud.
Fun video: https://www.youtube.com/watch?v=YLWmjpPoJHk
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”0px|0px|0px|0px” custom_margin=”||200px|” make_equal=”on” use_background_color_gradient_1=”off” use_background_color_gradient_2=”on” background_color_gradient_start_1=”#ff6a88″ background_color_gradient_start_2=”#ff5acd” background_color_gradient_end_1=”#ff99ac” background_color_gradient_end_2=”#fbda61″ background_color_gradient_direction_1=”35deg” background_color_gradient_direction_2=”34deg” background_color_gradient_start_position_2=”0%” background_color_gradient_end_position_1=”100%” background_color_gradient_end_position_2=”100%” padding_top_1=”40px” padding_right_1=”40px” padding_right_2=”5%” padding_bottom_1=”40px” padding_left_1=”40px” padding_left_2=”5%” _builder_version=”3.0.84″ box_shadow_style=”preset3″ box_shadow_vertical=”40px” box_shadow_blur=”50px” box_shadow_spread=”0px” box_shadow_color=”rgba(0,0,0,0.1)” module_alignment=”center”][et_pb_column type=”1_2″ _builder_version=”3.0.47″ padding_bottom=”40px” padding_left=”40px” padding_right=”40px” padding_top=”40px” parallax=”off” parallax_method=”on” use_background_color_gradient=”off” background_color_gradient_start=”#ff6a88″ background_color_gradient_end=”#ff99ac” background_color_gradient_direction=”35deg” background_color_gradient_end_position=”100%”][et_pb_text _builder_version=”3.19.7″ header_font=”||||||||” header_3_font=”Playfair Display|700|||||||” header_3_text_color=”#2b2b2b” header_3_font_size=”28px” header_3_line_height=”1.5em” custom_margin=”||10px|”]
Hacking Competition March 19th @2pm in Smith 234
[/et_pb_text][et_pb_divider color=”#f7d584″ divider_weight=”3px” height=”10px” disabled_on=”on|on|off” _builder_version=”3.2″ max_width=”80px” module_alignment=”left” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”3.0.83″ text_font=”Poppins||||||||” text_text_color=”rgba(0,0,0,0.4)” text_font_size=”16px” text_line_height=”1.9em” header_font=”||||||||” header_2_font=”||||||||” module_alignment=”center” custom_margin=”||30px|”]
On 19th March (Hacking competition) – it will be a team competition (teams will be formed onsite) where everyone can solve different puzzles and exercises to find answers. Tasks are in a beginner level to intermediate, everyone can choose the tasks to their interest and level. Participating in the event gives one understanding of how to think out of the box and also gather digital evidences and what cybersecurity competitions all about.
Something similar we did in Estonia 2019 December https://www.youtube.com/watch?time_continue=121&v=OfqglaLS5MU
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.47″ padding_left=”5%” padding_right=”5%” parallax=”off” parallax_method=”on” use_background_color_gradient=”on” background_color_gradient_start=”#ff5acd” background_color_gradient_end=”#fbda61″ background_color_gradient_direction=”34deg” background_color_gradient_start_position=”0%” background_color_gradient_end_position=”100%”][et_pb_image src=”http://cis.bentley.edu/sandbox/wp-content/uploads/images.jpg” align=”center” _builder_version=”3.19.7″ custom_margin=”-20px||-20px|” custom_padding=”|||” animation_style=”zoom” animation_direction=”right” animation_intensity_zoom=”10%” animation_starting_opacity=”100%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section]