{"id":1291,"date":"2018-06-05T05:06:00","date_gmt":"2018-06-05T05:06:00","guid":{"rendered":"http:\/\/codata.org\/blog\/?p=1291"},"modified":"2018-06-05T05:06:00","modified_gmt":"2018-06-05T05:06:00","slug":"register-now-june-14-symposium-on-statistics-and-data-science-for-a-cyber-secure-internet-of-things","status":"publish","type":"post","link":"https:\/\/codata.org\/blog\/2018\/06\/05\/register-now-june-14-symposium-on-statistics-and-data-science-for-a-cyber-secure-internet-of-things\/","title":{"rendered":"Register Now: June 14 Symposium on Statistics and Data Science for a Cyber Secure Internet of Things"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/ci4.googleusercontent.com\/proxy\/qWZNf0U5nugV5KUQApWQY5AgXXgk7NQ-lynjRpPbzDmqUD0ghBP2a-ftDbDBxenJ4yW4htfi0EicCV7bfbUZI6P3FBE_wv4f3gR94hStVPj431VkwymzNVBWZccj77GpglYSlhVl6YCkR6hjl29vGrUjBvne95EMkD3M_NA=s0-d-e1-ft#https:\/\/gallery.mailchimp.com\/eaea39b6442dc4e0d08e6aa4a\/images\/0a398b8e-20d8-4739-a645-498a1049e689.png\" width=\"500\" height=\"65\" \/><img loading=\"lazy\" decoding=\"async\" class=\"size-medium alignnone\" src=\"https:\/\/ci3.googleusercontent.com\/proxy\/sbYDsOd0qJ6AxQMvdyfUveHixRTogPLJANRdpI42kD2lpMqWpmdGed01r0DBrRfAclMZQic7i3NwYa8FKVq_y8uwa3g1Mr0Nroh-4I2pFfJTrrRrkJjkW2uMaFNMemgp4o0DIbWJJkyOYmN9PInWypb8kCHeyr5HmCoc7Is=s0-d-e1-ft#https:\/\/gallery.mailchimp.com\/eaea39b6442dc4e0d08e6aa4a\/images\/96da143e-58fc-4375-b1dd-b4973fb295f7.jpg\" width=\"800\" height=\"307\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Statistics and Data Science for a Cyber Secure Internet of Things\u00a0<\/strong><\/p>\n<p>Rapid growth in the number of devices connected through the internet of things (IoT) poses major challenges to maintaining connectivity, functionality, and security, as demonstrated by prominent cyber attacks launched through IoT devices. Traditional approaches in cyber security such as firewalls and encryption aim to prevent malicious intrusion, however additional countermeasures and approaches are necessary to detect and respond to malicious behavior and to identify when devices or data are compromised.<\/p>\n<p>The National Academies invite you to attend a symposium and webcast on Statistics and Data Science for a Cyber Secure Internet of Things on\u00a0<strong>June 14, 2018\u00a0in Washington, DC<\/strong>. During the event, speakers will discuss the role of statistical models and theory for IoT and for detecting, overcoming, and neutralizing cyber attacks.<\/p>\n<p><strong>Date\/Time<\/strong>:\u00a0June 14, 2018 from 1-5 p.m. EDT<br \/>\n<strong>Location<\/strong>: Keck Center, Room 100<br \/>\n<a href=\"https:\/\/maps.google.com\/?q=500+Fifth+St.+NW,+Washington,+DC+20001&amp;entry=gmail&amp;source=g\">500 Fifth St. NW, Washington, DC 20001<\/a><br \/>\nOr via webcast<br \/>\n<strong><a href=\"https:\/\/nap.us4.list-manage.com\/track\/click?u=eaea39b6442dc4e0d08e6aa4a&amp;id=64a662b5f9&amp;e=224f0417ba\">Register Now<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Statistics and Data Science for a Cyber Secure Internet of Things\u00a0 Rapid growth in the number of devices connected through the internet of things (IoT) poses major challenges to maintaining connectivity, functionality, and security, as demonstrated by prominent cyber attacks launched through IoT devices. Traditional approaches in cyber security such as firewalls and encryption aim [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1291","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/posts\/1291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/comments?post=1291"}],"version-history":[{"count":1,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/posts\/1291\/revisions"}],"predecessor-version":[{"id":1292,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/posts\/1291\/revisions\/1292"}],"wp:attachment":[{"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/media?parent=1291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/categories?post=1291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/tags?post=1291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}