{"id":8158,"date":"2019-03-06T12:21:37","date_gmt":"2019-03-06T17:21:37","guid":{"rendered":"http:\/\/cis.bentley.edu\/sandbox\/?p=8158"},"modified":"2019-03-06T13:12:28","modified_gmt":"2019-03-06T18:12:28","slug":"hack-through-search-presentation-by-dr-birgy-lorenz","status":"publish","type":"post","link":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/2019\/03\/06\/hack-through-search-presentation-by-dr-birgy-lorenz\/","title":{"rendered":"Hack Through Search Presentation by Dr Birgy Lorenz"},"content":{"rendered":"\n<p>Dr. Birgy Lorenz, the fullbright scholar at Bentley University,  presented to faculty and students on 3\/5\/2019 about open source intelligence, pawning, password security, phishing, and ethics around computer based decisions. Dr. Birgy Lorenz also touch upon what the future holds for technology and information security. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Attached are the PowerPoint slides:<br><\/p>\n\n\n<p><iframe loading=\"lazy\" src=\"https:\/\/docs.google.com\/presentation\/d\/e\/2PACX-1vRvlZ1ZHnjylRdjAy12kmAWPmoLIbrlb3A67XzaYG55VhZtc0kLkgkRYQ3d5uY0Awk8C_WbVfc5PNiU\/embed?start=false&amp;loop=false&amp;delayms=3000\" allowfullscreen=\"true\" mozallowfullscreen=\"true\" webkitallowfullscreen=\"true\" width=\"960\" height=\"569\" frameborder=\"0\"><\/iframe><\/p>\n\n\n<p>Attached is video of the presentation. <\/p>\n\n\n<p><iframe loading=\"lazy\" id=\"kaltura_player\" src=\"https:\/\/cdnapisec.kaltura.com\/p\/2074601\/sp\/207460100\/embedIframeJs\/uiconf_id\/35757951\/partner_id\/2074601?iframeembed=true&amp;playerId=kaltura_player&amp;entry_id=0_w722oun6&amp;flashvars[streamerType]=auto&amp;flashvars[localizationCode]=en&amp;flashvars[leadWithHTML5]=true&amp;flashvars[sideBarContainer.plugin]=true&amp;flashvars[sideBarContainer.position]=left&amp;flashvars[sideBarContainer.clickToClose]=true&amp;flashvars[chapters.plugin]=true&amp;flashvars[chapters.layout]=vertical&amp;flashvars[chapters.thumbnailRotator]=false&amp;flashvars[streamSelector.plugin]=true&amp;flashvars[EmbedPlayer.SpinnerTarget]=videoHolder&amp;flashvars[dualScreen.plugin]=true&amp;&amp;wid=0_dothfk8i\" allowfullscreen=\"\" webkitallowfullscreen=\"\" mozallowfullscreen=\"\" allow=\"autoplay *; fullscreen *; encrypted-media *\" title=\"Kaltura Player\" width=\"400\" height=\"285\" frameborder=\"0\"><\/iframe><\/p>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dr. Birgy Lorenz, the fullbright scholar at Bentley University, presented to faculty and students on 3\/5\/2019 about open source intelligence, pawning, password security, phishing, and ethics around computer based decisions. Dr. Birgy Lorenz also touch upon what the future holds for technology and information security. Attached are the PowerPoint slides: Attached is video of the [&hellip;]<\/p>\n","protected":false},"author":229,"featured_media":8082,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_mi_skip_tracking":false,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[237],"tags":[],"class_list":["post-8158","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking","entry","has-media"],"acf":[],"_links":{"self":[{"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/posts\/8158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/users\/229"}],"replies":[{"embeddable":true,"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/comments?post=8158"}],"version-history":[{"count":4,"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/posts\/8158\/revisions"}],"predecessor-version":[{"id":8172,"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/posts\/8158\/revisions\/8172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/media\/8082"}],"wp:attachment":[{"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/media?parent=8158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/categories?post=8158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cissandbox.bentley.edu\/sandbox\/index.php\/wp-json\/wp\/v2\/tags?post=8158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}