Understanding Cancer: What You Have to Know, and a Bit More – Dr. Lior Levy
We all heard about cancer, THE disease. This will not be your ordinary science lecture about cancer.
We will, of course, understand its basic: What is it? What causes it? And why is it so hard to find a cure?
But among other things, we will also discuss the link between cancer and the Teenage Mutant Ninja Turtles,
the connection between IKEA to DNA and on the relation between cars, cakes and cellular phones.
Got you intrigued, join me and hear all about it.
Shaping Future Minds: The Role of Computational Thinking and Creativity in K-12 Education” by Dr. Rotem Israel-Fishelson
Curious about how creativity and computational thinking can work together? Wondering how we can teach kids to think logically while unleashing their imagination?
Join us for an exciting talk where we’ll explore how these two seemingly different skills intersect.
Learn what they really mean, why they matter, and how fostering both can empower the next generation to tackle problems in bold, innovative ways.
Don’t miss out!
Bridging Computer Science & Public Policy: Measuring the Integrated Cyber Attack Surface Across US County Governments by Dr. Ido Sivan-Sevilla
Tech policy requirements are rarely implemented in the public eye.
Companies and agencies apply their compliance measures in ways that policymakers struggle to track, evaluate, and respond to.
My research aims to bridge this gap. Specifically, this project offers a novel methodological approach to collect and assess county government digital infrastructures’ size,
complexity, and vulnerability. By collecting data on 42,735 Internet-facing devices across 3,095 US county governments, I show, for the first time,
variations in size and severity of exposed county government attacks surface across the nation.
Previously studied as islands of cyber insecurity, the novel empirical approach holistically estimates potential country vulnerability to common attack vectors based
on exploitable services and aggregates common vulnerabilities and exposures (CVEs) and their severity and probability of exploitation across county infrastructures,
shedding light on the integrated attack surface created across US county governments