Cybersecurity /engineering/ en Two Ā鶹Ćā·Ń°ęĻĀŌŲBoulder students earn scholarships for women in cybersecurity /engineering/2019/09/27/two-cu-boulder-students-earn-scholarships-women-cybersecurity <span>Two Ā鶹Ćā·Ń°ęĻĀŌŲBoulder students earn scholarships for women in cybersecurity</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-09-27T09:12:46-06:00" title="Friday, September 27, 2019 - 09:12">Fri, 09/27/2019 - 09:12</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/engineering/sites/default/files/styles/focal_image_wide/public/article-thumbnail/hayes-peyrot.jpg?h=83eb93c2&amp;itok=iQa9qeIN" width="1200" height="800" alt="Stacy Hayes and Jennifer Peyrot"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/engineering/taxonomy/term/419"> Awards </a> <a href="/engineering/taxonomy/term/417"> Diversity </a> <a href="/engineering/taxonomy/term/387"> Students </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/engineering/taxonomy/term/124" hreflang="en">Blog</a> <a href="/engineering/taxonomy/term/431" hreflang="en">Cybersecurity</a> </div> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default 3"> <div class="ucb-article-text" itemprop="articleBody"> <div><div class="feature-layout-callout feature-layout-callout-xlarge"> <div class="ucb-callout-content"><p> </p><div class="imageMediaStyle medium_750px_50_display_size_"> <img loading="lazy" src="/engineering/sites/default/files/styles/medium_750px_50_display_size_/public/article-image/hayes-peyrot.jpg?itok=HbpP7TjO" width="750" height="422" alt="Stacy Hayes and Jennifer Perot with flatirons in background"> </div> <p>Senior Stacy Hayes (left) and graduate student Jennifer Peyrot (right) are the college's newest cyberscholars.&nbsp; </p></div> </div><p class="lead">Two College of Engineering and Applied Science students have received <a href="https://cra.org/cra-wp/scholarships-and-awards/scholarships/swsis/" rel="nofollow">Scholarships for Women Studying Information Security</a>.&nbsp;</p><p>Undergraduate Stacy Hayes and graduate student Jen Peyrot have both received a prestigious SWSIS award ā€” only 16 were given out this year ā€” that grants at least $5,000 to each winner.&nbsp;ā€œItā€™s unusual for a university to have more than one student recipient of this national award in a given year,ā€ said Dan Massey, director of the Technology, Cybersecurity and Policy program. ā€œWe have many women expressing interest in cybersecurity at the college, and to have two of our students recognized in this way shows the caliber of work they are producing.ā€</p><h2>Drawn to national defense</h2><p>Hayes is a senior studying computer science, where she is also pursuing a business minor. She is president of the Ā鶹Ćā·Ń°ęĻĀŌŲBoulder <a href="http://www.cutbp.org/SiteFiles/Home.html" rel="nofollow">Tau Beta Pi&nbsp;chapter</a> and is actively involved in <a href="http://wic.cs.colorado.edu/" rel="nofollow">Women in Computing</a>.&nbsp;</p><p>Originally planning to get a business degree, Hayes made a last-minute decision to apply to engineering school instead. ā€œI always liked math,ā€ said Hayes, ā€œand a friend told me Iā€™d be a great engineer. Now she gets to say ā€˜I told you so.ā€™ā€</p><blockquote><p>ā€œWith my dedication to help protect the nation, I recognize that my understanding of information security concepts is crucial so that I may be part of preventing further breaches. The safety and security of this country remains of the utmost importance and I want to dedicate my life to being part of the solution.ā€ - Stacy Hayes</p></blockquote><p>She discovered a strong aptitude for coding and fell in love with computer science, but after exploring possible career paths she might take with her degree, they all came up short for her.</p><p>ā€œNone of them seemed to fulfill my desire to contribute back to society,ā€ Hayes said. ā€œMy search led me to national defense, where I could make a bigger impact.ā€&nbsp;</p><p>She is attracted to cybersecurity because it is a constantly evolving field that, as she says, will never be fully figured out. Hayes has interned for two summers in software development at Lockheed Martin, where she participated on teams with a broad range of security expertise. She hopes to work there after graduation and contribute to protecting national security.</p><h2>From the Army to the classroom</h2><p>Shortly after signing up for her first cybersecurity course, Peyrot decided to pursue a Masterā€™s of Science in Technology, Cybersecurity and Policy. She wasnā€™t completely new to the subject, however, having previously served as a signals intelligence analyst in the U.S. Army. &nbsp;</p><p>ā€œWhen I was in the Army, I was a codebreaker, which is really data security, but people didnā€™t call it that back then,ā€ Peyrot said.</p><p>After the Army, she became a teacher and then an instructional technology coordinator in the St. Vrain Valley School District. In 2017, she organized a GenCyber camp with some advice and guidance from Massey. She began supporting teachers who were piloting cybersecurity education in the classroom and quickly became the point person for cybersecurity in the whole district.</p><blockquote><p>ā€œEven if students donā€™t go into the field of cybersecurity, they can bring that perspective into their business, and they can realize that this is part of everyday life and something that everyone needs to consider.ā€ - Jennifer Peyrot</p></blockquote><p>ā€œEven if students donā€™t go into the field of cybersecurity, they can bring that perspective into their business, and they can realize that this is part of everyday life and something that everyone needs to consider,ā€ said Peyrot.&nbsp;</p><p>The district is especially supportive of cyber education because there are so many cybersecurity firms in the area. Peyrot is engaged in developing partnerships with these companies to give students an opportunity to practice what they learn and see if this might be a career path for them.&nbsp;</p><p>She plans to continue her role in the school district while pursuing her masterā€™s at Ā鶹Ćā·Ń°ęĻĀŌŲBoulder. She noted that, as a teacher, the scholarship was essential for her to be able to afford graduate school.</p><p><br> &nbsp;</p></div> </div> </div> </div> </div> <div>Undergraduate Stacy Hayes and graduate student Jen Peyrot have both received a prestigious SWSIS award ā€” only 16 were given out this year ā€” that grants at least $5,000 to each winner. </div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Fri, 27 Sep 2019 15:12:46 +0000 Anonymous 3513 at /engineering Students compete in national Hacking for Defense contest /engineering/2019/07/19/students-compete-national-hacking-defense-contest <span>Students compete in national Hacking for Defense contest</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-07-19T15:06:18-06:00" title="Friday, July 19, 2019 - 15:06">Fri, 07/19/2019 - 15:06</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/engineering/sites/default/files/styles/focal_image_wide/public/article-thumbnail/founders_fund_0.jpg?h=27f988cb&amp;itok=3H6m40Dg" width="1200" height="800" alt="Students participating in Starts H4D stand together at Founders Fund sign"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/engineering/taxonomy/term/387"> Students </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/engineering/taxonomy/term/431" hreflang="en">Cybersecurity</a> </div> <span>Trevor Stanley</span> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default 3"> <div class="ucb-article-text" itemprop="articleBody"> <div><div class="feature-layout-callout feature-layout-callout-xlarge"> <div class="ucb-callout-content"><p> </p><div class="imageMediaStyle medium_750px_50_display_size_"> <img loading="lazy" src="/engineering/sites/default/files/styles/medium_750px_50_display_size_/public/article-image/founders_fund_0.jpg?itok=woV_nZ0s" width="750" height="450" alt="Students participating in Starts H4D stand together at Founders Fund sign"> </div> <p>From left, team members included Trevor Stanley, Chris Coffey, Will Shand, Cory Cranford and Gerano Montoya.</p></div> </div><p>Ā鶹Ćā·Ń°ęĻĀŌŲBoulder students were among only six universities invited to present an innovative network security concept in June as part of <a href="https://www.nsin.us/events/starts-h4d/" rel="nofollow">Starts H4D</a>, a pitch competition for cutting-edge national security solutions.</p><p>The group presented at Founders Fund, a leading venture capital firm in San Francisco, alongside teams from Stanford, University of Southern California and Duke on projects ranging from image recognition of drones, GPS jammer detection, innovative learning platforms and IoT security.</p><p>The Ā鶹Ćā·Ń°ęĻĀŌŲBoulder team included computer science graduate student Trevor Stanley, Leeds School of Business student Chris Coffey, applied mathematics masterā€™s student Will Shand, Technology, Cybersecurity and Policy program masterā€™s student Cory Cranford, and mechanical engineering masterā€™s student Gerano Montoya.</p><p>Their team, CharIoT (Characterizing the Internet of Things), developed a new machine learning approach for identifying different kinds of internet-enabled devices on a network.</p><p>Here, Trevor Stanley shares his takeaways from the class and competition:</p><p><em>The national Hacking for Defense program, sponsored by the <a href="https://www.nsin.us/" rel="nofollow">National Security Innovation Network</a>, was renamed Designing for Defense at Ā鶹Ćā·Ń°ęĻĀŌŲBoulder because of the emphasis our mentors placed on understanding first principles, making sense of extremely ambiguous and at times complex problems, and creating original solutions.</em></p><p><em>I participated in a hackathon hosted by NSIN (formerly called MD5) last year and immediately applied for next yearā€™s Designing for Defense course. I specifically set out to expand my knowledge and experiences through the course and felt empowered to take leadership on developing a solution to a real-world problem given to our team by the National Security Agency.</em></p><p><em>Our inclusive team of computer science students, applied math students and business students was committed to developing an effective and innovative solution for characterizing Internet of Things device traffic on a network, which could become invaluable for protecting military and healthcare networks.</em></p><p><em>Effective teamwork and communication was the biggest challenge and resource for our team. Over the semester our team dynamic and collective understanding of the NSAā€™s problem evolved. Helping the technical students and the business students communicate effectively with one another was incredibly rewarding for me personally, as I was able to draw on the skills I had developed while working on the Technology to Market team in my research group.</em></p><p><em>As a team, we were able to further develop our ability to respectfully debate, challenge each otherā€™s opinions, communicate, collaborate, and effectively execute on work that was essential to our mission. For instance, our team was the only one among the other seven that raised $700 in seed funding, formed a company, created over 80 datasets, and conducted over 80 interviews with industry and government experts.</em></p><p><em>After winning the final competition between other Ā鶹Ćā·Ń°ęĻĀŌŲBoulder teams working with various Department of Defense sponsors, our team decided to continue our project beyond the classroom.</em></p><p><em>We applied for the national Hacking for Defense competition, Starts H4D, co-sponsored by Founders Fund and NSIN in the heart of Silicon Valley.</em></p><p><em>I was humbled and inspired by the innovative solutions developed by the other teams and shared in the collective zeal for civilian service. CharIoT is a truly unique opportunity to continue adding value to the defense community as civilians, and weā€™ll continue this form of national service by utilizing the resources we gained from Starts H4D to further develop our IoT security solution.</em></p></div> </div> </div> </div> </div> <div>Ā鶹Ćā·Ń°ęĻĀŌŲBoulder students were among only six universities invited to present an innovative network security concept in June as part of Starts H4D, a pitch competition for cutting-edge national security solutions.</div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Fri, 19 Jul 2019 21:06:18 +0000 Anonymous 3107 at /engineering Ā鶹Ćā·Ń°ęĻĀŌŲBoulder is top producer in national cybersecurity competition /engineering/2019/06/25/cu-boulder-top-producer-national-cybersecurity-competition <span>Ā鶹Ćā·Ń°ęĻĀŌŲBoulder is top producer in national cybersecurity competition</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2019-06-25T13:21:44-06:00" title="Tuesday, June 25, 2019 - 13:21">Tue, 06/25/2019 - 13:21</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/engineering/sites/default/files/styles/focal_image_wide/public/article-thumbnail/hackathon.png?h=90b2bfd9&amp;itok=QXr92rL0" width="1200" height="800" alt="students collaborating around computers"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/engineering/taxonomy/term/413"> Education </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/engineering/taxonomy/term/431" hreflang="en">Cybersecurity</a> </div> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default 3"> <div class="ucb-article-text" itemprop="articleBody"> <div><p> </p><div class="imageMediaStyle medium_750px_50_display_size_"> <img loading="lazy" src="/engineering/sites/default/files/styles/medium_750px_50_display_size_/public/article-image/hackathon.png?itok=HIghdSh9" width="750" height="191" alt="Students in a large room collaborating with each other in front of computers."> </div> <p>Nearly 13,000 college students across America took part in the first stage of 2019&nbsp;<a href="https://www.cyber-fasttrack.org/" rel="nofollow">Cyber FastTack</a>&nbsp;competition during April,&nbsp;solving a series of increasingly difficult cybersecurity challenges to demonstrate their aptitude for cybersecurity careers.&nbsp;</p><p>Based on their success, 2,400 of those students ā€“ including 24 from the Ā鶹Ćā·Ń°ęĻĀŌŲ ā€“ received invitations to take part in the second round. In fact, Ā鶹Ćā·Ń°ęĻĀŌŲBoulder&nbsp;<a href="https://www.sans.org/cyber-fast-track/state-ranking" rel="nofollow">produced the most first-stage qualifiers</a>&nbsp;in Colorado and ranked No. 14 in the nation.</p><p>Students are now competing in the second stage for $2.5 million in scholarships for college tuition and advanced cybersecurity training, as well as for recognition for themselves and their colleges.</p><p>ā€œItā€™s great to be ranked first in the state and weā€™re proud of our 24 students who have advanced to the second stage,ā€ said Dan Massey, director of&nbsp;<a href="/program/tcp/" rel="nofollow">Technology, Cybersecurity and Policy (TCP)</a>&nbsp;and professor of computer science. ā€œThis is another indicator of the growing interest in the field which our recently launched cybersecurity program addresses.ā€</p></div> </div> </div> </div> </div> <div>Sponsored by governors in 25 states, the program trains students in critical skills while they compete for scholarships</div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Tue, 25 Jun 2019 19:21:44 +0000 Anonymous 3001 at /engineering