Cybersecurity / en George 鶹Ƶ student project presents sticky situation for hackers /news/2025-12/george-mason-student-project-presents-sticky-situation-hackers <span>George 鶹Ƶ student project presents sticky situation for hackers </span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2025-12-17T15:56:10-05:00" title="Wednesday, December 17, 2025 - 15:56">Wed, 12/17/2025 - 15:56</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun intro-text" lang="EN-US">When a cloud computing class at 鶹Ƶ called for a team project, </span><span class="TextRun SCXW204713740 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed intro-text" lang="EN-US">master’s</span><span class="TextRun SCXW204713740 BCX0 NormalTextRun intro-text" lang="EN-US"> student Kevin Landry saw an opportunity to share what he knew and give classmates a taste of real-world cyber defense.&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">A seasoned cybersecurity enthusiast, Landry introduced his team to the concept of a honeypot—a decoy system designed to lure and monitor cyber attackers. As he put it, honeypots allow you to “reach out and touch actual attackers,” bringing textbook concepts to life in a way few classroom exercises can match.</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">“You’ll never look at the internet the same way again after running a honeypot,” Landry said. “It’s eye-opening to see how many bots are out there scanning for vulnerabilities.”</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">For his teammates—many of whom had never built home labs—the project offered hands-on experience that mimicked an enterprise environment and bridged the gap between theory and practice. Honeypots aren’t just academic tools; companies maintain them to study hacker activity, identify patterns, and share intelligence that helps reveal common vulnerabilities.</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-12/me.png?itok=XrUPNkCU" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Kevin Landry. Photo provided.&nbsp;</figcaption> </figure> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">“It’s a low-investment, high-yield product that’s passive,” Landry explained. “You do all the coding and setup, then just let it run and watch attackers come in.”</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">The team deployed Cowrie, an open-source honeypot that simulates a Linux shell. But Landry didn’t settle for the default configuration.&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">“I changed every standard setting possible,” he said. “Fake encryption keys, fake password files, fake directories—everything to make it look like a lazy or incompetent sysadmin left the doors open.”&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">Those tweaks made the trap convincing enough to attract hundreds of attackers, from automated bots to human hackers.</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">Once customized, the honeypot started buzzing—logging intrusion attempts almost immediately. To make the experience even more interactive, the team integrated real-time alerts through Discord, receiving up to 500 notifications a day whenever an attacker </span><span class="TextRun SCXW204713740 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">engaged</span><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US"> with the system.&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">At one point, the attack volume was high enough that Discord temporarily rate-limited the alerts, thinking they were automated traffic. Landry resolved the issue by rotating through multiple webhooks and fine-tuning the alert frequency to keep everything running smoothly.</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">Over the course of 48 days, the honeypot captured an extensive dataset. Landry even created </span><a class="Hyperlink SCXW204713740 BCX0" href="https://gemini.google.com/share/24b205428724" target="_blank"><span class="TextRun Underlined SCXW204713740 BCX0 NormalTextRun" lang="EN-US">an interactive </span><span class="TextRun Underlined SCXW204713740 BCX0 FindHit" lang="EN-US">visuali</span><span class="TextRun Underlined SCXW204713740 BCX0 NormalTextRun" lang="EN-US">zation</span></a><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US"> of the activity for the team’s class presentation, showing where attacks originated and how they unfolded over time.</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">To make the project even more aligned with industry practices, Landry’s team uploaded the attackers’ IP addresses to Gray Noise Intelligence, a company that allowed him to use its enterprise-grade platform for the project. The software analyzes IP addresses and assigns confidence levels indicating how likely each one is malicious, giving students a window into professional threat intelligence workflows.&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">“It makes me feel good that I’m wasting hackers’ time or bots’ time,” Landry said.</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">For Landry—who served ten years in the U.S. Coast Guard and earned a bachelor’s degree in computer science from the University of Mary Washington before pursuing his master’s in applied information technology at George 鶹Ƶ—the honeypot was both an academic milestone and a career-building moment. He believes projects like this are essential for breaking into cybersecurity.</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">“Cybersecurity jobs—even entry-level—want three years of experience, but you can’t get experience without getting a job,” he noted. “Home labs and projects like this help build a portfolio and show employers you can do the work.”</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW204713740 BCX0" lang="EN-US"><span class="TextRun SCXW204713740 BCX0 NormalTextRun" lang="EN-US">As cyber threats grow more sophisticated, George 鶹Ƶ’s applied approach to technology education ensures students are ready to meet them head-on. For Landry, the honeypot was not only a class assignment but also a chance to turn passion into practice—and to share that experience with others.</span><span class="EOP SCXW204713740 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2025-12/screenshot_2025-12-15_at_12.58.53_pm.png" width="1425" height="698" loading="lazy"> </div> </div> <figcaption>An image from the interactive visualization of the project. Full visualization available here: https://gemini.google.com/share/24b205428724.</figcaption> </figure> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3801" hreflang="en">applied information technology graduate programs</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/166" hreflang="en">innovative classes</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Wed, 17 Dec 2025 20:56:10 +0000 Teresa Donnellan 344711 at Cyber security engineering student excels at his internship for the second time  /news/2025-10/cyber-security-engineering-student-excels-his-internship-second-time <span>Cyber security engineering student excels at his internship for the second time </span> <span><span>Shayla Brown</span></span> <span><time datetime="2025-10-06T10:15:06-04:00" title="Monday, October 6, 2025 - 10:15">Mon, 10/06/2025 - 10:15</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun intro-text" lang="EN-US">When 鶹Ƶ cyber security engineering student Noah Hinger interned at Surefire Cyber in summer 2023, his managers were so impressed with his work that they invited him back. Thanks to his previous experience, the Honors College student was able to take on more responsibility this summer at the computer security company and contribute to more projects.</span><span class="EOP SCXW222385057 BCX0 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US">“The experience from my first summer here let me understand what was happening and contribute across the company,” said Hinger, who is a sophomore in the College of Engineering and Computing. “Surefire Cyber has an amazing internship program. They're investing in us by having professional development meetings and providing us with the opportunity to talk to experts from different fields.” said Hinger.</span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US">“I think it’s helped me a lot to be able to practice my independence and accountability,” said Hinger, who also competes in George 鶹Ƶ’s Chess and Competitive Cyber Clubs. “I've had the chance to do projects on my own without necessarily needing to report to someone, and I've also learned so much from all the smart people at Surefire Cyber.”</span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-10/image_1.jpeg?itok=hK9dQk4f" width="340" height="560" loading="lazy"> </div> </div> <figcaption>Noah Hinger. Photo provided.</figcaption> </figure> <h5><span class="TextRun MacChromeBold SCXW222385057 BCX0 NormalTextRun" lang="EN-US"><strong>What made you choose Surefire Cyber for your internships?</strong></span><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US"> </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US">Surefire Cyber is a digital forensics and incident response company. When an organization gets hacked, they call Sur</span><span class="TextRun Underlined SCXW222385057 BCX0 NormalTextRun" lang="EN-US">e</span><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US">fire Cyber to conduct an investigation and restore systems so that everything's OK. As a technology intern, I am helping develop the code that our forensic analysts use to figure out what's happened and retrieve all the essential data. Surefire Cyber is really exceptional at using a lot of automation tools so that the forensic analysts can focus more on the big picture and the data they’re working with. </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></p> <h5><span class="TextRun MacChromeBold SCXW222385057 BCX0 NormalTextRun" lang="EN-US"><strong>What does a typical day </strong></span><span class="TextRun MacChromeBold SCXW222385057 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US"><strong>interning</strong></span><span class="TextRun MacChromeBold SCXW222385057 BCX0 NormalTextRun" lang="EN-US"><strong> at Surefire Cyber look like for you?</strong></span><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US"> </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US">I work under two groups: software development and information operations, or DevOps, and security engineering. For DevOps, I help to manage company infrastructure and work on a lot of coding assignments. </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US">Traditionally, there are software developers, and there are operations, which maintain it. DevOps is kind of a hybrid role, which means it entails coding, setting up servers, and being responsible for maintaining the infrastructure. </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></p> <h5><span class="TextRun MacChromeBold SCXW222385057 BCX0 NormalTextRun" lang="EN-US"><strong>How would you say George 鶹Ƶ has helped prepare you for this role?</strong></span><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US"> </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US">I definitely think more critically when problem-solving this time around, and I think that's in part due to George 鶹Ƶ, especially the Honors College research and literature classes that I’ve taken. I'm learning about a lot of new technologies in real time, so I have to be able to research and read about them and then apply that knowledge to my work. The courses have definitely helped me when it comes absorbing the information I’m reading about and then transferring it to my assignments at Surefire Cyber. </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US">Another thing about the Honors College is that I get to meet different people from different disciplines, and that's really helped me at Surefire Cyber when connecting and networking with colleagues. I think that's been really rewarding and something that George 鶹Ƶ's helped prepare me for. </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US">I've also gotten a lot of experience in my systems engineering and digital systems engineering </span><span class="TextRun SCXW222385057 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">classes, and</span><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US"> getting to see what goes into a lot of security minded decisions is very similar to what I’m doing in this internship. </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></p> <h5><span class="TextRun MacChromeBold SCXW222385057 BCX0 NormalTextRun" lang="EN-US"><strong>What’s your favorite thing about interning at Surefire Cyber?</strong></span><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US"> </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW222385057 BCX0"><span class="TextRun SCXW222385057 BCX0 NormalTextRun" lang="EN-US"><strong>My </strong>favorite thing about the company is that it’s always driving innovation and new discoveries within cybersecurity and digital forensics. They're always pushing for the best and trying to help people. That's the whole point of digital forensics is to be there for and helping them out on the worst day of their life. </span><span class="EOP SCXW222385057 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:feature_image" data-inline-block-uuid="3564ddc0-392e-4fda-9b0d-91a003d5dc23" class="block block-feature-image block-layout-builder block-inline-blockfeature-image text-overlaid"> <div class="feature-image"> <div class="narrow-overlaid-image"> <img src="/sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2024-09/all-1080x1080_internships.jpg?itok=6rzEswHt" srcset="/sites/g/files/yyqcgq291/files/styles/feature_image_small/public/2024-09/all-1080x1080_internships.jpg?itok=CT4U-0_9 768w, /sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2024-09/all-1080x1080_internships.jpg?itok=6rzEswHt 1024w, /sites/g/files/yyqcgq291/files/styles/feature_image_large/public/2024-09/all-1080x1080_internships.jpg?itok=NmBYvS-B 1280w" sizes="(min-width: 1024px) 80vw,100vw" alt> </div> <div class="headline-text"> <div class="feature-image-link"> <div class="field field--name-field-feature-image-link field--type-link field--label-hidden field__item"><a href="/internships">Explore Internships</a></div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="1a61d827-ae78-40fd-8f49-465121b60f93" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-f6b5c10b2e6abe317400409d8678b00ceb8dd8a4c5a0c09247baa856582c6852"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-12/congressional-internships-teach-mason-life-students-independence-resume-skills" hreflang="en">Congressional internships teach 鶹Ƶ LIFE students independence, resume skills</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 1, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-11/costello-student-leader-working-create-opportunities-all" hreflang="en">This Costello student leader is working to create opportunities for all </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">November 13, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/confidence-meets-opportunity-fall-2025-career-fair" hreflang="en">Confidence meets opportunity at Fall 2025 Career Fair </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 23, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/skills-learned-jurisprudence-learning-community-help-student-land-full-time-position" hreflang="en">Skills Learned in Jurisprudence Learning Community Help Student Land Full-Time Position</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 22, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/environmental-science-major-lands-internship-us-geological-survey" hreflang="en">Environmental science major lands internship with U.S. Geological Survey </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 15, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="52f821d6-1d2b-4ace-a7d3-0b743bbbd1b8"> <div class="cta"> <a class="cta__link" href="https://cybersecurity.gmu.edu/"> <p class="cta__title">Learn more about Cyber Security Engineering <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/20556" hreflang="en">Internship</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/821" hreflang="en">Honors College</a></div> <div class="field__item"><a href="/taxonomy/term/10431" hreflang="en">鶹Ƶ Competitive Cyber</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/21256" hreflang="en">CEC students</a></div> </div> </div> </div> </div> </div> Mon, 06 Oct 2025 14:15:06 +0000 Shayla Brown 343646 at George 鶹Ƶ’s Chief Information Security Officer protects the keys to the kingdom /news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom <span>George 鶹Ƶ’s Chief Information Security Officer protects the keys to the kingdom</span> <span><span>Lauren Reuscher</span></span> <span><time datetime="2025-09-04T10:42:10-04:00" title="Thursday, September 4, 2025 - 10:42">Thu, 09/04/2025 - 10:42</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">Matthew Dalton joined 鶹Ƶ as Chief Information Security Officer (CISO) in May, bringing more than 25 years of experience as a cybersecurity leader at R1 institutions. In his new role with Information Technology Services, he will provide vision and strategy for information security at Virginia’s largest public research university.&nbsp;</span></p> <p><span class="intro-text">We sat down with Dalton to learn more about today’s cybersecurity environment and how students, faculty, and staff can make sure they’re staying “cyber smart.”</span></p> <hr> <figure role="group"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/extra_large_content_image/public/2025-09/250805505.jpg?itok=sY1qNkdA" width="1480" height="987" alt="Portrait of Matthew Dalton standing outdoors on campus" loading="lazy"> </div> </div> <figcaption>Matthew Dalton, chief information security officer, 鶹Ƶ. Photo by Ron Aira/Office of University Branding</figcaption> </figure> <hr> <h5><span>What does information security entail, particularly in a higher education setting?&nbsp;</span></h5> <p><span>One of the main responsibilities of my role is to help set the cybersecurity strategy for the university, allowing the flexibility and freedom necessary for creative, educational, and research endeavors, while preventing the negative impacts of cybersecurity events.</span></p> <p><span>Information security is about managing the risk to the community, their data, and the systems they rely on, as well as the risks that are presented to the university from everyday events, malicious actors, and nation-state threats. Depending on the kind of information that a person possesses or accesses online, the threats can be very different across the university.&nbsp;</span></p> <h5><span>You have led information security at several different institutions. What drew you to a career in higher education, and specifically to 鶹Ƶ?&nbsp;</span></h5> <p><span>You could say that higher education is in my blood. Many of my family members have worked in education.&nbsp;There are family stories that my great-grandparents on one side met because they taught at the same college. In my immediate family and closer generations, many of them met at the same college and went on to careers that stressed the value of education.</span></p> <p><span>For me, the brightest possible future comes through education, learning about others' experiences, and using our combined experiences to find a better path forward. I think that 鶹Ƶ is one of the best examples of that in action.</span></p> <h5><span>What are the biggest changes in cybersecurity in higher education since you first entered the field?&nbsp;</span></h5> <p><span>I have seen two big changes. The first is the change from believing that individual researchers or departments at a large institution should manage information security requirements on their own. These days, it takes a coordinated effort across many different parts of the university to protect the information assets effectively.&nbsp;</span></p> <p><span>The second change is the need to bring information security closer to the individual person, rather than just the device or network that they are using. Early on, the computers were massive, and protecting the room that they were in may have been sufficient. Today, user credentials are the keys to the kingdom, and getting access to those unlocks the data that is everywhere, thanks to the cloud.</span></p> <h5><span>How do you work across other departments to reduce risks to the university?&nbsp;</span></h5> <p><span>With information technology embedded in everything across the university, it is essential that the security program works across the university as well. It’s more than just helping people not to click on that suspicious email; it’s about learning what they do in their role, so that the protections we put in place can complement, rather than compete with, their activities.&nbsp;</span></p> <h5><span>How does artificial intelligence (AI) factor into your role as chief information security officer?&nbsp;</span></h5> <p><span>Just like technology in general, AI is a force multiplier. You need to consider how AI can be used by people who are meaning ill intent just as effectively as it can be used by those who are trying to protect.&nbsp;</span></p> <p><span>It is important that AI be adopted into our strategy both from a threat-modeling perspective and how to deploy better protections for the university, so that we can respond effectively and quickly against whatever attacks come our way. &nbsp;</span></p> <h5><span>How can we better protect our personal information online? What are some important things for students, faculty, and staff to do in their daily lives?&nbsp;</span></h5> <p><span>Probably the most effective way to protect yourself online is to be aware of the hectic pace of the world we live in today. Be thoughtful in your approach, especially when it comes to emails, texts, social media messages, or any other way that some entity might interact with you.&nbsp;</span></p> <p><span>You need to stop, take time to breathe, and don't let the message dictate how frenetic a response you give. Think about whether this is a legitimate email or message, whether it's either too good to be true, or if it is trying to make you act with urgency.&nbsp;</span></p> <p><span>Almost every scam or phishing attempt has three things in common:</span></p> <ol> <li><span>The message tries to assert an authority that it may or may not have, posing as a tax collector, police, or even something like IT support.&nbsp;</span></li> <li><span>The message offers you something of value, like winning the lottery or an unclaimed prize—or a chance to avoid pain, such as past due taxes, and threats that your account is about to be suspended.</span></li> <li><span>The message holds a sense of urgency, telling you to act now, or telling you that you are actively in danger.&nbsp;</span></li> </ol> <p><span>If it seems strange, don’t engage. Instead, report it to&nbsp;</span><a href="https://its.gmu.edu/chat/"><span>Information Technology Services</span></a><span>.</span></p> <hr> <h5><span>Check out these other cybersecurity resources from George 鶹Ƶ:</span></h5> <p><a href="https://its.gmu.edu/working-with-its/it-security-office/security-best-practices/"><span>Security Best Practices—Information Technology Services</span></a></p> <p><a href="https://its.gmu.edu/2025/08/strong-passwords-add-security-to-accounts-and-devices/"><span>Strong passwords add security</span></a></p> <p><a href="https://its.gmu.edu/news/#:~:text=See%20all%20IT%20Security%20stories"><span>Information Technology Services (ITS) News—IT Security</span></a></p> <p>&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="a8918e9f-fcba-42b3-a544-46a4a9e2f40a"> <div class="cta"> <a class="cta__link" href="https://its.gmu.edu/news/"> <p class="cta__title">ITS news <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"> <div class="field field--name-field-cta-icon field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Icon</div> <div class="field__item"><div> <div class="field field--name-field-media-font-awesome-icon field--type-fontawesome-icon field--label-visually_hidden"> <div class="field__label visually-hidden">Icon</div> <div class="field__item"><div class="fontawesome-icons"> <div class="fontawesome-icon"> <i class="fas fa-desktop" data-fa-transform data-fa-mask style="--fa-primary-color: #000000; --fa-secondary-color: #000000;"></i> </div> </div> </div> </div> </div> </div> </div> </span> </a> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="4ededf22-8416-4c86-baea-5e0a9e3d7f16"> <div class="cta"> <a class="cta__link" href="https://its.gmu.edu/working-with-its/it-security-office/security-best-practices/"> <p class="cta__title">Cybersecurity best practices <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="181c8472-8c7a-4b4d-b7b6-979c1a61569c" class="block block-layout-builder block-inline-blocknews-list"> <h2>Read more like this</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-a6f0cf57d4890ec5ac20776b0010cbd5709325d2aaf93b3315f6fa0801c6ca07"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-12/george-mason-coaching-leaders-hold-first-professional-conference" hreflang="en">George 鶹Ƶ coaching leaders hold first professional conference </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 16, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-12/ajay-vinze-costello-college-business-dean-appointed-interim-provost" hreflang="en">Ajay Vinzé, Costello College of Business Dean, appointed interim provost </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 10, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-12/clock-susan-kehoe-unleashes-potential-service-dogs-training" hreflang="en">Off the Clock: Susan Kehoe unleashes the potential of service dogs in training</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-11/julie-hudson-december-employee-month" hreflang="en">Julie Hudson is December Employee of the Month</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 1, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-11/university-day-service-awards-honor-service-milestones-george-mason-employees" hreflang="en">University Day Service Awards honor the service milestones of George 鶹Ƶ employees </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">November 20, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/206" hreflang="en">Faculty and Staff News</a></div> <div class="field__item"><a href="/taxonomy/term/621" hreflang="en">Information Technology Services</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4666" hreflang="en">AI</a></div> <div class="field__item"><a href="/taxonomy/term/4656" hreflang="en">Artificial Intelligence</a></div> <div class="field__item"><a href="/taxonomy/term/20826" hreflang="en">GCI-Grand Challenge Initiative</a></div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div> </div> </div> Thu, 04 Sep 2025 14:42:10 +0000 Lauren Reuscher 343046 at Cybersecurity student hopes to use his powers for good /news/2025-08/cybersecurity-student-hopes-use-his-powers-good <span>Cybersecurity student hopes to use his powers for good </span> <span><span>Shayla Brown</span></span> <span><time datetime="2025-08-29T11:49:25-04:00" title="Friday, August 29, 2025 - 11:49">Fri, 08/29/2025 - 11:49</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun intro-text" lang="EN-US">When 鶹Ƶ cyber security engineering major Connor Wadlin learned about ransomware attacks on organizations, such as the one on the Health Service Executive in Ireland</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun intro-text" lang="EN-US">,</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun intro-text" lang="EN-US"> in his CYSE 445 System Security and Resilience class, it confirmed his commitment to dedicating his educational and professional career to protecting and preserving human lives.&nbsp;</span><span class="EOP TrackedChange SCXW140835998 BCX0 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“There’s nothing more important than protecting and defending others. As an engineer, I’m driven to get important work done by thinking about complex problems and finding suitable solutions,” said Wadlin, who is from Leesburg, Virginia.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Since winter 2024, the </span><a class="Hyperlink SCXW140835998 BCX0" href="https://honorscollege.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Honors College</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> student has been interning at the </span><a class="Hyperlink SCXW140835998 BCX0" href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node.html" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Commonwealth Cyber Initiative</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> (CCI) Northern Virginia Node, George 鶹Ƶ’s branch of the statewide network dedicated of excellence in cybersecurity research. CCI’s mission includes workforce development through training the next generation of cybersecurity experts.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-08/250819602.jpg?itok=gVKY2IIJ" width="560" height="374" loading="lazy"> </div> </div> <figcaption>CEC student and Commonwealth Cyber Initiative intern Connor Wadlin. Photo by Ron Aira/Office of University Branding.</figcaption> </figure> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“It’s a super exciting job because I get to work with </span><span class="TextRun SCXW140835998 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">AprilTags</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">, which are on objects that the drone's camera then sees and scans. Instead of sharing data, the tags utilize location information for navigation, tracking objects, or pathing purposes,” he said.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin is also simulating drone flight with the Microsoft tool Air Sim, a project he presented at the </span><a class="Hyperlink SCXW140835998 BCX0" href="https://cyberinitiative.org/events-programs/events-for-2025/cci-symposium-2025.html" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">CCI Symposium</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> in April. “I created a model with a 98% accuracy, really high F1 score—higher than what we could find on the market—detecting collisions so the drones would be able to respond to anomalous factors such as objects that get too close</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">,</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> environmental variables, cyber-attacks, and more,” he explained.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin learned about many of the tools he’s currently using for CCI in his classes with </span><a class="Hyperlink SCXW140835998 BCX0" href="https://cec.gmu.edu/" target="_blank"><span class="TextRun Highlight Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">College of Engineering and Computing</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> professors</span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">, such as his </span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">mentor </span><a class="Hyperlink SCXW140835998 BCX0" href="https://volgenau.gmu.edu/profiles/mgebril" target="_blank"><span class="SCXW140835998 BCX0 TrackChangeTextInsertion TrackedChange TextRun Underlined NormalTextRun" lang="EN-US">Mohamed Gebril</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">, an associate professor in the Department of Cyber Security Engineering.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“George 鶹Ƶ supports people where they are to get them where they want to be,” Wadlin said.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">The skills Wadlin has acquired during his time at George 鶹Ƶ and in his work with CCI have enable him to help other students in their studies.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Connor is a very skilled student and has been able to develop different programs, as well as 12 labs for sophomore- and freshman-level students at George 鶹Ƶ. He even assists the students during our workshops,” said Gebril.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin is participating in George 鶹Ƶ’s </span><a class="Hyperlink SCXW140835998 BCX0" href="/admissions-aid/accelerated-masters" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Bachelor’s to Accelerated Master’s Program</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> and will to pursuing a master’s degree also in cyber security.</span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> Gebril said he’s looking forward to having Wadlin in his classes again as a graduate student.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun EmptyTextRun SCXW140835998 BCX0" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“It will be a smooth transition from the undergraduate to the graduate level because the curriculum aligns well with the CCI mission, which is to equip our students with the tools to conduct research activity and develop cutting</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">edge technology,” said Gebril.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin’s team is also working to develop</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> a first</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">of</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">its</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">kind cyber drone race that incorporates cybersecurity challenges and artificial intelligence for undergraduate students.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin was diagnosed with autism at 19 and sees this diagnosis as working to his advantage by allowing him to see things from different perspectives and approach problems with his own unique ideas.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun EmptyTextRun SCXW140835998 BCX0" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“As an engineer, you have to ask yourself ‘how is this making the world a better place?’ That's always got to be the end goal,” said Wadlin.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="0cea7810-3f69-41bb-a54e-947fabf8f245"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/"> <p class="cta__title">Explore the College of Engineering and Computing <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/mgebril" hreflang="und">Mohamed Gebril</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="f48742ce-f36a-4b68-9a09-4ea4555c6ffb" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-559b65b649e3cba4af38037bdcdd950a3e836390fe76b659254dfcdd4cec6d90"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-12/congressional-internships-teach-mason-life-students-independence-resume-skills" hreflang="en">Congressional internships teach 鶹Ƶ LIFE students independence, resume skills</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 1, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-11/costello-student-leader-working-create-opportunities-all" hreflang="en">This Costello student leader is working to create opportunities for all </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">November 13, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-11/commonwealth-cyber-initiative-helps-launch-new-start-ups" hreflang="en">Commonwealth Cyber Initiative helps launch new start-ups </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">November 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/confidence-meets-opportunity-fall-2025-career-fair" hreflang="en">Confidence meets opportunity at Fall 2025 Career Fair </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 23, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/skills-learned-jurisprudence-learning-community-help-student-land-full-time-position" hreflang="en">Skills Learned in Jurisprudence Learning Community Help Student Land Full-Time Position</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 22, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/721" hreflang="en">internships</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/821" hreflang="en">Honors College</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/21256" hreflang="en">CEC students</a></div> </div> </div> </div> </div> </div> Fri, 29 Aug 2025 15:49:25 +0000 Shayla Brown 342981 at Five George 鶹Ƶ cybersecurity students hack their way to Boston /news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston <span>Five George 鶹Ƶ cybersecurity students hack their way to Boston </span> <span><span>Jennifer Pocock</span></span> <span><time datetime="2025-07-31T10:38:39-04:00" title="Thursday, July 31, 2025 - 10:38">Thu, 07/31/2025 - 10:38</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="TextRun SCXW254463957 BCX0 NormalTextRun intro-text" lang="EN-US">The Country to Country (C2C) Capture the Flag (CTF) contest is an international competition that issues challenges to code, decrypt, search, hack, and reverse engineer their way through as many challenges as possible.</span><span class="EOP SCXW254463957 BCX0 intro-text">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-07/1751924384845.png?itok=uFP2TDau" width="560" height="297" loading="lazy"> </div> </div> <figcaption>(C2C) CTF contestants gathered from across the globe to solve pernicious problems. Photo provided.</figcaption> </figure> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">鶹Ƶ 500 students from nearly 100 countries, ranging from inexperienced freshmen to PhD candidates in cybersecurity</span><span class="TrackChangeTextInsertion TrackedChange SCXW266550933 BCX0 TextRun NormalTextRun" lang="EN-US">,</span><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US"> competed individually in the qualifying rounds. Only the top 100—including five from 鶹Ƶ—were accepted into the finals. Four went to Boston for the competition, held this year at Northeastern University.&nbsp;</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">The </span><a href="https://cec.gmu.edu/"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">College of Engineering and Computing</span></a><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US"> students Gael Abboud, Sanjay Kumar Samala, Nhat Le, and Jonah Wilbur represented the green and gold, but were all placed on different teams. (Amaan Abbas also made the cut but could not attend.)</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">“The organizers were amazing,” said Abboud, who is a graduate student pursuing her master's in systems engineering through the </span><a href="/admissions-aid/accelerated-masters"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">Accelerated Master's Program</span></a><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">. She explained that they try to make it a truly international and cooperative competition. Ideally, each team would contain people from different countries.&nbsp;</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">“Somehow, I ended up on a team with two other people from Virginia,” Abboud said with a laugh. “They came from Virginia Commonwealth University and William and Mary.”</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">Her Virginia-strong team did the state proud. Over a day of competition, they sometimes worked together and sometimes apart to solve as many problems as possible from across various skill sets.&nbsp;</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">It’s not just coding. Abboud described one of the challenges. “It was open-source intelligence, which is </span><span class="TextRun SCXW266550933 BCX0 NormalTextRun AdvancedProofingIssueV2Themed" lang="EN-US">really just</span><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US"> fancy Googling. They set a scene where we had to find a very certain scooter repair shop in Boston. They told us that it was near a metro stop and in sight of an Indian restaurant. Seems like it should be easy, but it wasn’t!”&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">They also had to track down things like the price of the building and the vice president of the company that sold it more than 60 years ago. “No one solved that one.”</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">In the end, Abboud’s team landed in fourth place: an admirable showing when the contestants represent some of the best from around the globe. “I was so disappointed,” she sighed. “There was less than one point separating us from the third-place team.”</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">Abboud said that she loved every minute and would tell anyone curious about hack-a-thons to try qualifying for this Capture the Flag event.&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">“It may seem intimidating, but there are challenges for any skill level,” she said. “You don’t know what it will be like if you don’t try. &nbsp;Don’t stress if you don’t know something. People are happy to walk you through how they solved it.”</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0">&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="df4163a0-5e9e-4ea9-8a46-a6b51307cecf"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/"> <p class="cta__title">Learn more about the College of Engineering and Computing <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="cfe360fc-a6bc-493f-b473-66d882279911" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="b1fe0cb9-6461-40fd-8a76-aa2a9b266111" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-a635f9be8320908bffc30984a5708a143b0e2b0c538e0cf9bd20450b9bb7bb09"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-11/george-mason-hackathon-team-turns-heads-online-award-winning-cat-robot" hreflang="en">George 鶹Ƶ hackathon team turns heads online with award-winning cat robot </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">November 17, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-mason-university-students-ran-big-dogs-defense-hackathon" hreflang="en">鶹Ƶ students ran with the big dogs at defense hackathon </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 11, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George 鶹Ƶ turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/15806" hreflang="en">competitions</a></div> <div class="field__item"><a href="/taxonomy/term/8986" hreflang="en">Hackathon</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> </div> </div> </div> </div> </div> Thu, 31 Jul 2025 14:38:39 +0000 Jennifer Pocock 251101 at Safeguarding George 鶹Ƶ’s research and researchers /news/2025-06/safeguarding-george-masons-research-and-researchers <span>Safeguarding George 鶹Ƶ’s research and researchers </span> <span><span>Katarina Benson</span></span> <span><time datetime="2025-06-18T14:45:55-04:00" title="Wednesday, June 18, 2025 - 14:45">Wed, 06/18/2025 - 14:45</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="TextRun SCXW119951882 BCX0 NormalTextRun intro-text" lang="EN-US">Earlier this year, Melissa Perez was named assistant vice president for research security in the Office of Research Integrity and Assurance at 鶹Ƶ. In this role, she oversees university-wide policies and processes to ensure compliance with research security laws and regulations (including export control), international collaborations, travel, and cybersecurity. As George 鶹Ƶ’s designated research security officer, she also leads institutional responses to threats affecting the university’s research compliance and standing.</span><span class="EOP TrackedChange SCXW119951882 BCX0 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><em><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">Perez has more than 20 years of research compliance experience, including the past decade leading George 鶹Ƶ’s export compliance and secure research programs—most recently as director for export compliance and secure research. She recently shared her insights on the university’s Research Security Program, regulatory challenges, and the impact </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">on</span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"> researchers.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></em></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-06/m_perez.jpg?itok=8IhWeHGV" width="279" height="350" loading="lazy"> </div> </div> <figcaption>Melissa Perez. Photo by Office of University Branding</figcaption> </figure> <p class="Paragraph SCXW49919964 BCX0" lang="EN-US"><strong><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></strong></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>What inspired you to take on this new role?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">I majored in international relations at St. Joseph’s University and law at American University. I enjoy analyzing the geopolitical aspects of research security and how the federal government uses regulations to advance its foreign policy goals. I began actively advocating for a research security program at George 鶹Ƶ in 2023 because the U.S. government has been messaging to universities how critical it is to protect U.S. research and the role universities have in safeguarding the research.&nbsp;</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span><span class="EOP SCXW49919964 BCX0"> </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">I am committed to supporting our researchers and knew that I wanted to have an even greater role in ensuring that they can pursue their international research safely and responsibly. I have created and expanded other compliance programs at George 鶹Ƶ that support our faculty and researchers, and I am excited for the opportunity to create a new program that will be a resource for the George 鶹Ƶ community.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><strong><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></strong></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>Why is a research security program vital for George 鶹Ƶ, and how does it align with the requirements of National Security Presidential Memorandum 33 (NSPM-33)?&nbsp;</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">Under NSPM-33, the U.S. government mandates that R1 universities like George 鶹Ƶ establish robust research security programs to protect U.S. technology against foreign government misappropriation. The Research Security Program enables us to meet this requirement and continue receiving federal funding, and it also demonstrates to government sponsors George 鶹Ƶ’s commitment to protecting our research and researchers when they engage with international colleagues.&nbsp;&nbsp;</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>What are the key security challenges universities face?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">One key challenge is raising awareness of threats and risks, and helping researchers recognize international activities that may compromise their research, their funding, or their careers. When people hear “research security,” they often think that the U.S. government is only interested in protecting classified or sensitive research, but, in fact, the threat of misappropriation goes beyond that and includes fundamental or basic research.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><strong><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></strong></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>NSPM-33 introduces specific guidelines for safeguarding research. How </strong></span><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US"><strong>you</strong></span><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong> plan to ensure compliance without stifling academic freedom?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">While there is an inherent tension between limiting what faculty can do, from a regulatory perspective, and academic freedom, the goal of George 鶹Ƶ’s Research Security Program is to help researchers identify international activities that are safe, secure, and that protect them, their research teams, and their careers. I don’t want to stop collaborations; I want to make sure that our researchers can engage in these activities with confidence that the collaborations will benefit them, the university, and the scientific community.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><strong><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></strong></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>What are your top priorities for the first year of implementation?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">The priorities for the first year are communications and outreach as they are key to raising awareness and establishing buy-in and a culture of compliance. Research security applies to all federally funded research and will impact anyone involved in federally funded research, especially researchers collaborating internationally. That’s why outreach is so important. I want to ensure that faculty, staff, and students understand the new requirements and how the evolving policy landscape impacts them. In terms of workflow changes, by working with offices across campus to refine our processes around foreign travel security and cybersecurity, my intent is to embed elements of research security into existing processes rather than create new workflows for people to follow. My goal is to make research security easy and unobtrusive for </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">the researchers</span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>Universities thrive on collaboration. How does the program ensure that partnerships with external entities remain productive and secure?&nbsp;</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">A strong research security program will allow us to maintain and grow the level of international engagements at George 鶹Ƶ. Without this program and the processes and tools that will be a part of it, it is much harder from a risk perspective to evaluate which activities may involve a high level of risk that could jeopardize our research or researchers.&nbsp;</span><span class="EOP SCXW49919964 BCX0"> &nbsp;</span></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>Can you provide an example of a security threat that could potentially compromise research at a university, and how the program will prepare to address it?&nbsp;</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">One example is the U.S. government’s policy regarding Malign Foreign Talent Recruitment Programs (MFTRP). In the past, being selected to participate in a program such as China’s Thousand Talents Program was considered an achievement. Today, participation in a foreign talent program that the U.S. government considers “malign” could jeopardize a researcher’s ability to receive federal funding.&nbsp;</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">To ensure that our researchers remain eligible to bid on federal projects, we have a pre-approval process in RAMP where we review foreign appointments and affiliations to determine whether they would be </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">a MFTRP</span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">.&nbsp; If the researcher is contemplating an activity that would be considered a MFTRP, I work with the researcher to mitigate risk by removing terms that make the activity “malign,” and I provide guidance so that they can weigh the risks associated with such foreign appointments.&nbsp;&nbsp;</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">Cybersecurity is one of the pillars of NSPM-33, and my office will partner with many across campus who manage cybersecurity threats, including the Office of Research Computing, ITS, and the IT units in the colleges, to make sure that all research security policies addressing cybersecurity are coordinated and reflect industry best practices.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>How do you envision adapting the program over time?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">In my role as research security officer, it will be my responsibility to be aware of regulatory changes in this space and to have a pulse on how other universities are responding to these changes. As the regulatory landscape evolves, I will work with leadership to communicate those changes to our researchers. Our program will need to be agile to reflect changes implemented by the U.S. government. Policies and guidance are shifting rapidly, and a big challenge will be keeping our community </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">up-to-date</span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="37c22b1e-2f73-434b-a0cd-78b28f5c0127" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="f0a1012d-8478-4e58-9747-e8b3f070a26a"> <div class="cta"> <a class="cta__link" href="https://gmu.edu/research"> <p class="cta__title">Learn more about Research at George 鶹Ƶ <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="8cb98d08-d845-4f4b-8302-ee4792a0d63e" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="5d85d82c-33e4-4c26-a392-c9baaf9c6551" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-54a0dc06bcd8e58a1b570c689cfc6869f1a63e37a6002984d092346430c8fcce"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-12/george-mason-student-project-presents-sticky-situation-hackers" hreflang="en">George 鶹Ƶ student project presents sticky situation for hackers </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 17, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/cyber-security-engineering-student-excels-his-internship-second-time" hreflang="en">Cyber security engineering student excels at his internship for the second time </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 6, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George 鶹Ƶ’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston" hreflang="en">Five George 鶹Ƶ cybersecurity students hack their way to Boston </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 31, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/206" hreflang="en">Faculty and Staff News</a></div> <div class="field__item"><a href="/taxonomy/term/1111" hreflang="en">Office of Research Innovation and Economic Impact</a></div> </div> </div> </div> </div> </div> Wed, 18 Jun 2025 18:45:55 +0000 Katarina Benson 117846 at Sit! Stay! Buzz? /news/2025-05/sit-stay-buzz <span>Sit! Stay! Buzz?</span> <span><span>Jennifer Pocock</span></span> <span><time datetime="2025-05-29T10:56:51-04:00" title="Thursday, May 29, 2025 - 10:56">Thu, 05/29/2025 - 10:56</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">These 鶹Ƶ students are short-circuiting voice commands, dog whistles, and clickers.</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-05/jwb_050625_gmu-oscars009-final_0.jpeg?itok=LL92aYfb" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Covert Dog Comms Team Leader Paul J. Wyche displays their finished prototype at the Office of Student Creative Activities and Research (OSCAR) Celebration. Photo by John Boal</figcaption> </figure> <p class="MsoNormal">If you’ve had a puppy, you probably know the patience it takes to train them in basic commands, and it can be a noisy affair involving begging, pleading, and some yelling. Working dogs like those in police and military K9 units need to learn so much more.&nbsp;</p> <p class="MsoNormal">Sometimes, they need to obey without hearing a word.&nbsp;</p> <p class="MsoNormal">Rescue situations can be chaotic, with so much going on that a command gets lost in the noise. Sometimes, a team of dogs need to hear many different commands, and competing voices are confusing. Other times, operation teams need to go radio silent and any noise at all will give their positions away.</p> <p class="MsoNormal">Enter Team Covert Dog Comms. This pack of cybersecurity seniors at George 鶹Ƶ, all of whom graduated in May, sniffed out a way to direct dogs without barking commands.</p> <p class="MsoNormal">Together, they became the dream team that was the envy of anyone who has ever worked on a bad group project—and proof that great leadership combined with a passionate team yields amazing results.&nbsp;</p> <p class="MsoNormal">“Working with this team has been a very positive experience. One key factor that made it successful was the balance of specialized skill sets,” said team leader Paul J. Wyche, who also recently spoke at his College of Engineering and Computing graduation. “While some of our backgrounds overlapped, each team member had a distinct area of expertise, allowing us to overcome any obstacle and collaborate effectively.”</p> <p class="MsoNormal">Those members were Maxime Bonnaud, who specialized in the vest’s wireless and cryptographic security; Jonathan Perry, who designed the hardware; and AJ Hoepfner, who set up testing standards and regulations, along with assisting Wyche with project management.</p> <p class="MsoNormal">“Mostly, what made this team great was good execution on the fundamentals,” said Bonnaud. “Everyone showed up, communicated well, and looked for areas they could work on instead of having to be assigned work.”&nbsp;</p> <p class="MsoNormal">The end result was a securely encrypted working prototype of a vest that can be programmed with three different vibrating pattern commands that a dog can be trained to obey. While they were unable to find a working dog to test on, the team tested the vest on themselves and found it to work as intended.&nbsp;</p> <p class="MsoNormal">When asked whether the team planned to patent or commercialize the vest, Wyche said that they wouldn’t rule it out. “We haven’t formally discussed commercializing the project. However, if the opportunity arises and we receive the necessary support, we may explore those possibilities.”&nbsp;</p> <p class="MsoNormal">Until then, they achieved their goal of making “a fully operational haptic vest that could be refined for real-world use in special operations.”</p> <p class="MsoNormal">And that is something to howl about.</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4281" hreflang="en">Senior Capstone Project</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/2076" hreflang="en">Military</a></div> <div class="field__item"><a href="/taxonomy/term/1246" hreflang="en">Police and Public Safety</a></div> <div class="field__item"><a href="/taxonomy/term/4261" hreflang="en">Prototype</a></div> <div class="field__item"><a href="/taxonomy/term/481" hreflang="en">Graduation</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/20206" hreflang="en">Defense and Security</a></div> </div> </div> </div> </div> </div> Thu, 29 May 2025 14:56:51 +0000 Jennifer Pocock 117531 at George 鶹Ƶ and CodeLock work on securing the software supply chain /news/2025-05/george-mason-and-codelock-work-securing-software-supply-chain <span>George 鶹Ƶ and CodeLock work on securing the software supply chain </span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-05-15T07:27:25-04:00" title="Thursday, May 15, 2025 - 07:27">Thu, 05/15/2025 - 07:27</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">鶹Ƶ </span><span class="intro-text">Department of Information Sciences and Technology </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">Professor Kun Sun received a grant from the </span><a href="https://cyberinitiative.org" title="CCI Nova"><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">Commonwealth Cyber Initiative (CCI) of Northern Virginia</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> to collaborate with </span><a href="https://www.codelock.it" title="CodeLock"><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed intro-text" lang="EN-US">CodeLock,</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> Inc</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">., a Virginia-based technology company specializing in software security. The grant totals $75,000 for one year and is part of CCI’s </span><a href="https://cyberinitiative.org/innovation/cyber-acceleration-catapult/call-for-proposals.html" title="CCI"><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">Academic Support for Cybersecurity Entrepreneurship and Next-Gen Development</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> (ASCEND) Fund. </span><span class="EOP SCXW190735760 BCX4 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">“The idea for this funding is to partner a startup company with university subject matter experts,” said Sun. “The focus of this grant is to build a platform that connects startups with academic experts to solve technical industry challenges.”  </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">The project will integrate Sun’s previous research on automated security patching with </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock’s</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> technology for secure software supply chain using dynamically generated digital signatures to develop solutions that address vulnerabilities in source code. </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-02/untitled_0.png?itok=8IWyGgqi" width="350" height="350" loading="lazy"> </div> </div> <figcaption>The CCI is Virginia’s main access point for cybersecurity research, innovation, workforce development. Image courtesy CCI.&nbsp;</figcaption> </figure> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> offers a cybersecurity platform designed to secure software development processes by providing real-time monitoring, compliance automation, and protection against insider threats and supply chain attacks. It creates a forensic chain of custody by linking every code change to its developer, ensuring transparency and integrity throughout the software development lifecycle. ​ </span><span class="LineBreakBlob BlobObject DragDrop SCXW190735760 BCX4">&nbsp;</span><br><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> </span><span class="LineBreakBlob BlobObject DragDrop SCXW190735760 BCX4">&nbsp;</span><br><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">“</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">So</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> for software supply chain security we install outside software applications on our smartphones and computers, for example,” said Sun. “That software may rely on  other software and we have this term, SBOM, which means software bill of material. It says that we need to know what other dependent software is used and can we trust that software? If you install software, you need to verify it has not been manipulated or modified by an attacker.” Sun will apply his 10+ years of research on automatic software vulnerability detection and automated program repair. </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">“The vast majority of software supply chain attacks begin with compromised credentials—something traditional security tools are ill-equipped to prevent,” said </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> CEO Brian Gallagher. “By enforcing zero-trust authentication at the developer level and linking that identity to a tamper-proof chain of custody, </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> is fundamentally reshaping the threat landscape. Partnering with George 鶹Ƶ allows us to build on that foundation by automating vulnerability patching, which not only strengthens security but also delivers measurable cost savings for our customers. This collaboration accelerates our mission to bring transparency, accountability, and efficiency to software development across both government and commercial sectors.”</span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">The project team will get feedback from </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock’s</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> existing customers and collaborate with CCI and the </span><a href="https://www.nvtc.org" title="NVTC"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">Northern Virginia Technology Council</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> to refine the solution for broader commercial adoption. Additional funding will be provided by </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> and supplemented through grant opportunities. </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ksun3" hreflang="und">Kun Sun</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="addcd760-8411-417d-bff5-264648e05587" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-c6d49a138d9d7ab7bdcec82e8dcb05cb0f52ffb4e756bec799bcce0e6858a06f"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-12/george-mason-student-project-presents-sticky-situation-hackers" hreflang="en">George 鶹Ƶ student project presents sticky situation for hackers </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 17, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-11/commonwealth-cyber-initiative-helps-launch-new-start-ups" hreflang="en">Commonwealth Cyber Initiative helps launch new start-ups </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">November 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/commonwealth-cyber-initiative-nova-node-nurtures-next-gen-cyber-sleuths" hreflang="en">Commonwealth Cyber Initiative NoVa Node nurtures next-gen cyber sleuths </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 9, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/cyber-security-engineering-student-excels-his-internship-second-time" hreflang="en">Cyber security engineering student excels at his internship for the second time </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 6, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/10196" hreflang="en">software</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Thu, 15 May 2025 11:27:25 +0000 Nathan Kahl 117286 at Cyber sweep: George 鶹Ƶ students take top three spots in national transportation cybersecurity competition /news/2025-03/cyber-sweep-george-mason-students-take-top-three-spots-national-transportation <span>Cyber sweep: George 鶹Ƶ students take top three spots in national transportation cybersecurity competition </span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2025-03-27T10:42:35-04:00" title="Thursday, March 27, 2025 - 10:42">Thu, 03/27/2025 - 10:42</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun intro-text" lang="EN-US">"I'm going to teach you how to hack a modern car," said 鶹Ƶ professor </span><a class="Hyperlink SCXW105000804 BCX0" href="https://cec.gmu.edu/profiles/marafin" target="_blank"><span class="TextRun Underlined SCXW105000804 BCX0 NormalTextRun intro-text" lang="EN-US">Tanvir Arafin</span></a><span class="TextRun SCXW105000804 BCX0 NormalTextRun intro-text" lang="EN-US"> to the fall 2024 cohort of CYSE 465 Transportation Systems Design. </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun SpellingErrorV2Themed intro-text" lang="EN-US">Arafin</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun intro-text" lang="EN-US"> not only introduced his students to such exciting concepts in transportation security, but he also incorporated the opportunity to participate in a nationwide cybersecurity competition into his course.</span><span class="EOP SCXW105000804 BCX0 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">The entire class of 12 from the </span><a class="Hyperlink SCXW105000804 BCX0" href="https://cybersecurity.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW105000804 BCX0 NormalTextRun" lang="EN-US">Department of Cyber Security Engineering</span></a><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> chose to participate in the optional assignment and several won first, second, and third place at the &nbsp;</span><a class="Hyperlink SCXW105000804 BCX0" href="https://www.uh.edu/cybercare/newsevents/cyber-care-competition/" target="_blank"><span class="TextRun Underlined SCXW105000804 BCX0 NormalTextRun" lang="EN-US">National Transportation Cybersecurity Competition</span></a><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> (NTCC) in November 2024. George 鶹Ƶ’s Finn Schaefer won first place; the team of Noor Mohammed, Sonia Shaukat, Caleb Hughston, and Kayleigh Batchos won second place; and Navraj Singh Gill won third place.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-03/cars-1.png?itok=yaFw7tTc" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Adobe Stock</figcaption> </figure> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">The national competition was open to all university students, both undergraduate and graduate, who could participate individually or in teams of up to four, guided by a faculty advisor. This year’s competition was titled “CYBER-CARE Challenge 2024: Securing the Future of Transportation.”&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">Participants faced a series of cybersecurity challenges, including password cracking, traffic management system exploitation, Vigenère cipher decryption, SQL injection vulnerability identification, cross-site scripting (XSS) attacks, and vehicle trajectory anomaly detection. They had a few weeks to complete the challenges remotely.&nbsp;</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Arafin</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> developed CYSE 465 by integrating real-world scenarios and cutting-edge research findings from his lab. He has been working in hardware and cyber-physical systems security with a key focus on cybersecurity issues of autonomous and transportation systems. CYSE 465 covers understanding data, communication, operating systems, control, and security primitives used in today's vehicles for safe and intelligent control and navigation.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">“The course offers a unique perspective on the cyber vulnerabilities that emerge from the security-oblivious modernization of transportation systems,” said </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Arafin</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">.&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">While he has taught the course since 2022, this was the first time he incorporated the competition into the course. </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Arafin</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> noted that such competition participation can greatly enhance students’ resumes, and first-place winner Schaefer, a busy student, greatly appreciated the chance to participate.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">“This was actually the first competition that I've competed in,” he said, explaining that it’s hard to find time for such activity outside of school and work. Schaefer’s favorite challenge at the NTCC involved assessing vehicle datasets to detect problems or attacks. He drew from his personal interest in machine learning to solve the challenge.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">“I've worked with machine learning models a lot in my own personal projects, but I've never had an applicable use for it,” said Schaefer. “So, it was interesting to </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun AdvancedProofingIssueV2Themed" lang="EN-US">actually see</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> my work have real meaning to it for once. I was able to do something </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun AdvancedProofingIssueV2Themed" lang="EN-US">pretty cool</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">.”&nbsp;</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">Through courses like CYSE 465, which bridge the gap between theoretical knowledge and practical application, the Department of Cyber Security Engineering is fostering a new generation of cybersecurity professionals who are well-equipped to secure the future of transportation systems.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">"The students’ competition performance is a very compelling argument on the benefits of bringing the results and lessons learned in the research lab directly to the classroom, something many CYSE faculty are doing," said </span><a class="Hyperlink SCXW105000804 BCX0" href="https://volgenau.gmu.edu/profiles/pcosta" target="_blank"><span class="TextRun Underlined SCXW105000804 BCX0 NormalTextRun" lang="EN-US">Paulo Costa</span></a><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">, the department's faculty chair.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">The achievements of George 鶹Ƶ students at the NTCC highlight the importance of this approach. By bringing state-of-the-art research directly to the classroom, the Department of Cyber Security Engineering is preparing students to become leaders in the field. As the cybersecurity landscape continues to evolve, the department's innovative educational strategies will ensure that its graduates are ready to meet the challenges of tomorrow.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/marafin" hreflang="en">Tanvir Arafin</a></div> <div class="field__item"><a href="/profiles/pcosta" hreflang="und">Paulo Costa</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="21ff7f92-f193-4b04-9ccf-e546087191ad" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="c5327acb-36f8-4659-9eb8-aeee4690865b"> <div class="cta"> <a class="cta__link" href="https://cybersecurity.gmu.edu/"> <p class="cta__title">Learn more about Cybersecurity at George 鶹Ƶ <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="6f715fa7-870b-4dd2-a905-748fddbf6156" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="20ccc63b-185d-4b0b-983c-389957a1f2fb" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-b3a7fd43877f517b4ee699d6ce7d54e5ca71d885e8e2bad5acab665e37aac839"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-12/george-mason-student-project-presents-sticky-situation-hackers" hreflang="en">George 鶹Ƶ student project presents sticky situation for hackers </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 17, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/cyber-security-engineering-student-excels-his-internship-second-time" hreflang="en">Cyber security engineering student excels at his internship for the second time </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 6, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/one-woman-team-puts-many-eyes-skies" hreflang="en">A one-woman team puts many eyes in the skies </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 1, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/10161" hreflang="en">transportation engineering</a></div> <div class="field__item"><a href="/taxonomy/term/1076" hreflang="en">Student Success</a></div> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/166" hreflang="en">innovative classes</a></div> <div class="field__item"><a href="/taxonomy/term/17356" hreflang="en">Strategic Direction</a></div> </div> </div> </div> </div> </div> Thu, 27 Mar 2025 14:42:35 +0000 Teresa Donnellan 116366 at Nearly 500 high schoolers get expert advice at Virginia CyberSlam 2025 /news/2025-03/nearly-500-high-schoolers-get-expert-advice-virginia-cyberslam-2025 <span>Nearly 500 high schoolers get expert advice at Virginia CyberSlam 2025 </span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2025-03-17T12:20:56-04:00" title="Monday, March 17, 2025 - 12:20">Mon, 03/17/2025 - 12:20</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun intro-text" lang="EN-US">Nearly 500 high school students from across the commonwealth gathered at 鶹Ƶ for Virginia </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed intro-text" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun intro-text" lang="EN-US"> 2025, where cybersecurity experts from both the public and private sectors shared industry insights during a day of activities aimed at inspiring the next generation of cybersecurity professionals.&nbsp;</span><span class="EOP SCXW163820684 BCX0 intro-text">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-03/cyberslam_2025-2.png?itok=S69YBjX3" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Dolores Garza addresses CyberSlam 2025 attendees. Photo by Teresa Donnellan/CEC</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun CommentStart" lang="EN-US">“</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">What an event it was March 10, with 475 students representing 22 schools and six school districts from around the commonwealth enjoying hands-on workshops and activities led by cyber experts from industry, government, and higher education,” said </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> founder Chris Starke, a teacher for Loudoun County Public Schools who co-directed the event with the University of Alabama in Huntsville’s Jennifer Marden. “In all, 28 presenters combined to run 12 workshops—6 for each of our novice and advanced students. It was truly rewarding to see students enjoy learning about cybersecurity.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Students heard from keynote speaker Dolores Garza, Branch Chief of the Technical Operations Group at the United States Marshals Service, among others. Garza oversaw the creation of a cyber investigation unit at the U.S. Marshals and described the evolution of cybersecurity as a professional field. She encouraged attendees to stay open to new technological developments and emphasized the need for a hybrid set of skills that combines criminal investigatory techniques with technical expertise.</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">“Diversity in technology is not just an asset; it is a necessity,” said Garza. “The more perspectives we bring to problem-solving, the stronger and more effective our solutions become.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-03/cyberslam_2025-6.png?itok=NquBylb_" width="560" height="293" loading="lazy"> </div> </div> <figcaption>Student navigates drone during CyberSlam 2025. Photo by Ron Aira/Office of University Branding.</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Throughout the day, professionals led hands-on workshops in various aspects of cybersecurity.</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">David Raymond from </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Virginia Cyber Range</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> led a session on advanced Capture the Flag challenges, focusing on Wireshark.&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun CommentStart" lang="EN-US">Greg Crabb</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> from </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">10-8, LLC</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, conducted a tabletop exercise on incident response and deep fake technology, and Randy Benn from </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Claroty</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> introduced students to the Internet of Things.&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Other experts leading workshops represented </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Vertex11</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, &nbsp;OpusType Advisors, </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun CommentStart" lang="EN-US">the</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Idaho National Laboratory</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, the </span><span class="FieldRange SCXW163820684 BCX0 TextRun Underlined NormalTextRun" lang="EN-US">Drug Enforcement Administration</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><span class="FieldRange SCXW163820684 BCX0 TextRun Underlined NormalTextRun CommentStart" lang="EN-US">CYBER.ORG</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, George 鶹Ƶ, and </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Shenandoah University</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, leading workshops on drones, deep fakes, digital forensics, and more.</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-03/cyberslam_2025-5.png?itok=0CrQKcAq" width="560" height="293" loading="lazy"> </div> </div> <figcaption>Students participate in a CyberSlam workshop. Photo by Ron Aira/Office of University Branding&nbsp;</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">“I would like to thank our co-hosts, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://cybersecurity.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">George 鶹Ƶ’s Department of Cyber Security Engineering</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> and Loudoun County Public Schools, as well as the </span><a class="Hyperlink SCXW163820684 BCX0" href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node.html" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Commonwealth Cyber Initiative Northern Virginia Node</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> (CCI </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">NoVA</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> Node), Virginia Cyber Range,&nbsp;Vertex11, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://www.caci.com/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">CACI International Inc</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">., </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Claroty</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://codehs.com/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">CodeHS</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://www.widelity.com/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Widelity, Inc.</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, and </span><a class="Hyperlink SCXW163820684 BCX0" href="https://gtedge.ai/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">GT Edge AI</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> for sponsoring this wonderful event that in four years has impacted more than 1,600 students,” said Starke. “</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">And,</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> thank you to our exhibitors the </span><a class="Hyperlink SCXW163820684 BCX0" href="https://www.cisa.gov/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Cybersecurity and Infrastructure Security Agency</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://competitivecyber.club/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">鶹Ƶ Competitive Cyber</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> (MCC), </span><a class="Hyperlink SCXW163820684 BCX0" href="https://cec.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">George 鶹Ƶ’s College of Engineering and Computing</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, GT Edge AI, and the </span><a class="Hyperlink SCXW163820684 BCX0" href="https://va.ng.mil/Army-Guard/91st-Cyber/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Virginia National Guard 91</span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun Superscript" lang="EN-US"><sup>st</sup></span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> Cyber Brigade</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-03/cyberslam_2025-3_0.png?itok=j-7EUDNh" width="350" height="350" loading="lazy"> </div> </div> <figcaption>CyberSlam attendees navigate drones in a workshop. Photo by Jennifer Marden</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">One event highlight was a panel featuring George 鶹Ƶ students from the MCC club—Dylan Charnick, Dylan Knoff, and Danyaal </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Shaozab</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">. MCC is known for its inclusivity, welcoming George 鶹Ƶ students from all majors and levels of experience. The club meets twice weekly, hosting impressive speakers, running workshops on cybersecurity skills, and forming teams to participate successfully in various CTF events throughout the year.&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">During the panel, the MCC students fielded questions from the audience about degree programs at George 鶹Ƶ, the benefits of technical certifications, and how to best prepare for a career in cybersecurity. “Most cyber jobs are here in the D.C. area,” noted Knoff, pointing out one benefit of pursuing cybersecurity at George 鶹Ƶ.</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> fosters the cultivation of cybersecurity talent in Northern Virginia, where the industry is booming. This year’s event particularly underscored the opportunities in both public and private sectors that are preparing the next generation of cybersecurity professionals, ensuring they are equipped with the skills and knowledge needed to thrive in this rapidly growing field.</span><span class="EOP CommentStart SCXW163820684 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">“I would like to thank CCI </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">NoVA</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> Node, specifically Liza Durant and Jordan 鶹Ƶ for sponsoring the amazing raffle prizes and their support for the Virginia </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, and also George 鶹Ƶ’s Elizabeth Dean&nbsp;for making this event possible,” said Marden. “We could not have done this with the support of George 鶹Ƶ, CCI, our presenters, sponsors, and of course our wonderful Virginia cybersecurity educators and students.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="df8242b0-caab-447b-9b69-6f967a4432e7" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="29c404d3-7f4b-4bd9-bb7b-ead7d1d616f6"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/strengths/cybersecurity"> <p class="cta__title">Explore Cybersecurity at George 鶹Ƶ <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="ef2037b0-71ae-4792-ad61-df0597edd70d" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="2b541678-77ec-40ec-8ada-77de7c0e366b" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-1b3a8aec8cfe11e33720ab58082f03ff81c70aa7cce7375f6f2f7db42b36d52e"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-12/george-mason-student-project-presents-sticky-situation-hackers" hreflang="en">George 鶹Ƶ student project presents sticky situation for hackers </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 17, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/cyber-security-engineering-student-excels-his-internship-second-time" hreflang="en">Cyber security engineering student excels at his internship for the second time </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 6, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George 鶹Ƶ’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Mon, 17 Mar 2025 16:20:56 +0000 Teresa Donnellan 116276 at