{"id":6398,"date":"2021-08-28T00:28:53","date_gmt":"2021-08-28T08:28:53","guid":{"rendered":"https:\/\/internetsafety.trendmicro.com\/university\/events\/2021-summit-2"},"modified":"2021-11-03T00:57:37","modified_gmt":"2021-11-03T08:57:37","slug":"2020-summit","status":"publish","type":"page","link":"https:\/\/www.trendmicro.com\/internet-safety\/university\/events\/2020-summit\/","title":{"rendered":"2020 TMIE Virtual Cybersecurity Summit for University Students"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.9.9&#8243; custom_margin=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; disabled_on=&#8221;off|off|off&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#f7f9f9&#8243; background_color_gradient_end=&#8221;#e5e5e5&#8243; parallax=&#8221;on&#8221; custom_padding=&#8221;20px||||false|false&#8221; custom_padding_tablet=&#8221;40px||||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; width_last_edited=&#8221;on|desktop&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.10.6&#8243; global_colors_info=&#8221;{}&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.10.6&#8243; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;0px||&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; padding_tablet=&#8221;0px||&#8221; padding_last_edited=&#8221;on|tablet&#8221; custom_padding__hover=&#8221;|||&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_text _builder_version=&#8221;4.10.6&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;2em&#8221; header_font=&#8221;Open Sans|600|||||||&#8221; header_text_color=&#8221;#333333&#8243; header_font_size=&#8221;40px&#8221; header_line_height=&#8221;1.3em&#8221; header_font_size_tablet=&#8221;30px&#8221; header_font_size_phone=&#8221;25px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; inline_fonts=&#8221;Bubblegum Sans&#8221; global_colors_info=&#8221;{}&#8221; custom_padding=&#8221;20px||||false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<h1><span style=\"color: #333333; font-family: Open Sans; --darkreader-inline-color: #c8c3bc;\" data-darkreader-inline-color=\"\">2020 TMIE Virtual\nCybersecurity Summit for University Students<\/span><\/h1>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.9&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;2em&#8221; header_font=&#8221;Faustina||||||||&#8221; header_text_color=&#8221;#0e7162&#8243; header_font_size=&#8221;60px&#8221; header_line_height=&#8221;1.3em&#8221; global_colors_info=&#8221;{}&#8221;]<h3><span style=\"font-size: large;\">Check out the recordings from our 2020 Virtual Cybersecurity Summit.<\/span><\/h3>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;\/internet-safety\/wp-content\/uploads\/university\/images\/banner-university-students-2.jpg&#8221; alt=&#8221;Trend Micro Cybersecurity Education for Universities&#8221; title_text=&#8221;banner-university-students-2&#8243; show_bottom_space=&#8221;off&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.9.9&#8243; max_height=&#8221;515px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;|0vw||&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_intensity_slide=&#8221;2%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#f7f9f9&#8243; background_color_gradient_end=&#8221;#f7f9f9&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_tabs _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_tab title=&#8221;Objectives&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"d-none d-lg-block d-xl-block\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit-2020.jpg\"><\/p>\n<h2><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/banner-2020summit.jpg\" width=\"450\" align=\"right\" style=\"border: 1px solid #ddd;\" class=\"d-none d-lg-block d-xl-block\" \/>Objectives<\/h2>\n<p style=\"line-height: 2.1em;\">The TMIE Virtual Cybersecurity Summit for University Students is organized and sponsored by <a href=\"https:\/\/www.trendmicro.com\/TMIE\" target=\"_blank\" rel=\"noopener\">Trend Micro Initiative for Education<\/a> \u2013 a community cybersecurity education outreach program.<\/p>\nOur goal is to initiate cybersecurity knowledge sharing and stimulate students\u2019 interest in cybersecurity careers in collaboration with TMIE and leading universities.\n\nThe Summit coincides with the 2020 NIST NICE Cybersecurity Career Awareness Week.\n<h2>Audience<\/h2>\n<p style=\"line-height: 2.1em;\">College students, faculty members, and cybersecurity professionals \u2014 FOR FREE!<\/p>\n\n<h2>Breakout Tracks<\/h2>\n<ol style=\"line-height: 2.1em;\">\n\t<li>Learning more about cybersecurity industry\n<ul style=\"margin-left: 25px;\">\n\t<li>CISO Round table (to explore cybersecurity journey)<\/li>\n\t<li>Technology, virtual world, and the future of education<\/li>\n\t<li>How to land jobs in IT\/cybersecurity<\/li>\n<\/ul>\n<\/li>\n\t<li>Career Opportunity Discovery\n<ul style=\"margin-left: 25px;\">\n\t<li>Resource shortage and wide range of jobs in high demand today<\/li>\n\t<li>Diversity, Equity, and Inclusion (DEI) in cybersecurity<\/li>\n\t<li>Investor\u2019s view on cybersecurity<\/li>\n<\/ul>\n<\/li>\n\t<li>Information exchange and networking\n<ul style=\"margin-left: 25px;\">\n\t<li>Cybersecurity program sharing by universities<\/li>\n\t<li>Networking Opportunities with cybersecurity students\/faculties and professionals<\/li>\n<\/ul>\n<\/li>\n<\/ol>[\/et_pb_tab][et_pb_tab title=&#8221;Speakers&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/1-marian.png\" class=\"pull-right\">Marian Merritt<\/h4>\n<p><strong>NIST\/NICE<\/strong><\/p>\n<p>Marian Merritt is the Lead for Industry Engagement for the National Initiative for Cybersecurity Education (NICE) at the National Institute of Standards and Technology (NIST)\/ U.S. Department of Commerce. Marian has over 20 years of experience working in the cybersecurity industry, with experience in product management, corporate website management, family online safety programs and corporate philanthropy. She previously was with Symantec Corporation as their Director of Cyber Education and Online Safety Programs. Marian attended Boston University\u2019s Questrom School of Business for her undergraduate degree and holds an MBA from the Wharton School at the University of Pennsylvania.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/2-anders.png\" class=\"pull-right\">Anders Gronstedt, PhD<\/h4>\n<p><strong>NIST\/NICE<\/strong><\/p>\n<p>President of The Gronstedt Group, is an author, public speaker and entrepreneur. He is an advocate of using Next-Gen Learning tools to advance real-world skills through virtual and augmented reality training, game and simulation-based learning. The Gronstedt Group has been instrumental in helping global companies like Walmart, Pfizer, Novartis, DaVita, and KPMG improve performance. Their \u201cSpark City\u201d mobile management and logistics game for Walmart is revolutionizing the way the world\u2019s largest employer attracts and develops a new generation of managers and they help pharma leaders. \u201cCloud Defense\u201d cyber security game won the Business Category of the Serious Game competition. Novartis and Pfizer save lives in virtual reality labs. Dr. Gronstedt\u2019s articles have appeared in the Harvard Business Review.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/3-alan.png\" class=\"pull-right\">Alan Wong, PhD<\/h4>\n<p><strong>Director, Silicon Valley Center for Global Studies, San Jose State University<\/strong><\/p>\n<p>Alan Wong serves as Director of Silicon Valley Center for Global Studies at San Jose State University. He is also the Director of Business Development &#038; External Relations, College of Professional and Global Education. In this role, he works extensively with the Silicon Valley Big Data &#038; Cybersecurity Center in promoting cybersecurity. He was the instructor of record for the Master of Science in Data Analytics seminar. Dr. Wong was a semiconductor technologist and represented Intel Corporation to the Advanced Metrology Advisory Group ofInternational SEMATECH, an industry consortium. He had 9 U.S. patents during his time at Intel.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/4-alyssa.png\" alt=\"\" class=\"pull-right\">Alyssa Miller<\/h4>\n<p><strong>Application Security Advocate, Snyk Ltd.<\/strong><\/p>\n<p>Alyssa Miller (CISM) is a hacker, security advocate, author, professional, and public speaker with almost 15 years of experience in the security industry. She has always had a passion for deconstructing technology, particularly since buying her first computer at the age of 12 teaching herself BASIC programming. In her career, Alyssa has performed all forms of security assessments but given her developer background, she had a dedication to application security. She specializes in working with business and security leaders to design and deploy effective security programs that strengthen enterprise security posture.<\/p>\n<p>Alyssa is also committed to evangelizing security. Not only does she speak internationally at various industry, vendor and corporate events, Alyssa also engages in the community through her online content, media appearances, and security community activism. Her journey through security was recently featured in an article by Cybercrime Magazine. She\u2019s also been recognized in Peerlyst\u2019s e-Book \u201c50 Influential Penetration Testers\u201d. Alyssa is board member for Women of Security (WoSEC) and has participated on multiple panels discussing solutions to reduce the diversity gap in security. Currently, Alyssa is an Application Security Advocate for London-based Snyk Ltd.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/5-amanda.png\" alt=\"\" class=\"pull-right\">Amanda Veras<\/h4>\n<p><strong>Sales Engineer, Trend Micro<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/6-andre.png\" alt=\"\" class=\"pull-right\">Andre Alves<\/h4>\n<p><strong>Cloud Security Architect, Trend Micro<\/strong><\/p>\n<p>Andre Alves has been helping companies  achieve safer environments for information exchange for over 10 years. Has always enjoyed tinkering with computers and being on the edge of new technologies, even back as a nerdy teenager in Brazil. Andre is a  Trender for life, has a degree in Computer Information Systems with a minor in Business Management, is a certified AWS Solutions Architect and Hybrid Cloud Security, trainer. Has spoken and lectured in Egypt, South and North America and Europe.  Andre loves to give back t others in the cybersecurity community. #Trender4Life<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/7-antonio.png\" alt=\"\" class=\"pull-right\">Antonio Cano<\/h4>\n<p><strong>Operations Partner, Trend Forward Capital<\/strong><\/p>\n<p>With over 35 years of experience, Antonio leads TFC&#8217;s operational and finance activities playing the operations partner role, validating that the fund\u2019s and portfolio\u2019s executive teams have the people processes, and tools, as the efficiency and effectiveness on their application for creating value. He is also responsible for planning and, managing the execution of the fund&#8217;s investment initiatives being mindful of the investment thesis\u2019s and objectives. Supporting as well through reporting and constant interactions the investor relations, as the investor partners for whom he also acts as allied sparring.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/8-boris.png\" alt=\"\" class=\"pull-right\">Boris Vasquez<\/h4>\n<p><strong>Cybersecurity System Engineer, Trend Micro<\/strong><\/p>\n<p>Profesional de la ciberseguridad con amplia experiencia liderando grandes proyectos de Ciberseguridad y Seguridad de la Informaci\u00f3n en organizaciones P\u00fablicas y Privadas. En mi carrera profesional he trabajado como analista, auditor, arquitecto y consultor de ciberseguridad en importantes empresas en Chile y Latinoam\u00e9rica. Actualmente trabajo en el desarrollo de proyectos de ciberseguridad que ayudan a impulsar la transformaci\u00f3n digital de las empresas. Los \u00e1mbitos de la Ciberseguridad donde trabajo activamente, est\u00e1n enfocados en la defensa de Red, Detecci\u00f3n de Brechas, Protecci\u00f3n de Infraestructuras Cr\u00edticas, protecci\u00f3n de servidores en ambientes de Nube, Protecci\u00f3n de Endpoints, Inteligencia de Amenazas, Detecci\u00f3n de Vulnerabilidades y Respuesta a Incidentes.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/9-bruno.png\" alt=\"\" class=\"pull-right\">Bruno Diniz<\/h4>\n<p><strong>Chief Services and Operations Officer, Logical IT<\/strong><\/p>\n<p>Information security executive with 15 years of experience in CyberSecurity, Incident Response and Security Operations. Husband, father and NERD.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/10-carlos.png\" alt=\"\" class=\"pull-right\">Carlos Aguilar<\/h4>\n<p><strong>Technical Specialist &#8211; Security &amp; Compliance, Microsoft<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/11-claudia.png\" alt=\"\" class=\"pull-right\">Claudia Anania<\/h4>\n<p><strong>CIO, Instituto Butantan<\/strong><\/p>\n<p>Claudia Anania \u00e9 formada em Ci\u00eancia da Computa\u00e7\u00e3o pela Pontif\u00edcia Universidade Cat\u00f3lica de S\u00e3o Paulo, e possui MBA em Arquitetura e Gest\u00e3o de Infraestrutura de TI. Possui mais de 30 anos de experi\u00eancia na \u00e1rea de TI, sendo que nos \u00faltimos 10 anos atuou como Head da \u00e1rea de Tecnologia. Atualmente, atua como Head de TI no Instituto Butantan, ind\u00fastria farmac\u00eautica com maior produ\u00e7\u00e3o de imunobiol\u00f3gicos do Brasil, onde lidera uma equipe de 45 colaboradores. Seus maiores desafios nessa posi\u00e7\u00e3o \u00e9 buscar novas tecnologias que proporcionem melhorias nos processos, seguran\u00e7a da informa\u00e7\u00e3o e continuidade do neg\u00f3cio. No Butantan, tamb\u00e9m \u00e9 respons\u00e1vel por garantir o funcionamento dos sistemas relacionados \u00e0 testagem de COVID-19. Anteriormente, atuou como Head de TI na Unigel, ind\u00fastria qu\u00edmica de grande porte, onde liderou projetos em todas as \u00e1reas de neg\u00f3cio, em especial nas \u00e1reas Comercial, Log\u00edstica, Manufatura, e na pr\u00f3pria TI, com grande foco em Transforma\u00e7\u00e3o Digital e Seguran\u00e7a da Informa\u00e7\u00e3o.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/12-daniel.png\" alt=\"\" class=\"pull-right\">Daniel Eliot<\/h4>\n<p><strong>Director of Education &amp; Strategic Initiatives, National Cybersecurity Alliance<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/13-danielm.png\" alt=\"\" class=\"pull-right\">Daniel Mauser<\/h4>\n<p><strong>Microsoft Global Black Belts, Microsoft<\/strong><\/p>\n<p>Daniel Mauser currently works as a network specialist for Microsoft USA&#8217;s Global Black Belts. He is one of the authors of the book Security+, holds an MBA degree from FGV. He has been working with information technology since 1992.  He began his career as a Network Analysis with previous experiences as a Security Consultant and Windows Server and Azure Escalation Engineer.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/14-ed.png\" alt=\"\" class=\"pull-right\">Ed Cabrera<\/h4>\n<p><strong>Chief Cybersecurity Officer, Trend Micro<\/strong><\/p>\n<p>Eduardo Cabrera is responsible for analyzing emerging cyberthreats to develop innovative and resilient enterprise risk management strategies for Fortune 500 clients and strategic partners. Before joining Trend Micro, he was a 20-year veteran and former CISO of the US Secret Service with experience leading information security, cyber-investigative and protective programs in support of the Secret Service integrated mission. He started his career investigating transnational cybercriminal groups targeting the financial and retail sectors and later led cyber-forensic operations in support of Secret Service large-scale data breach investigations. He then served as the Secret Service Strategic Advisor to the DHS National Cybersecurity and Communications Integration Center (NCCIC).<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/15-elwyn.png\" alt=\"\" class=\"pull-right\">Elwyn Pryce<\/h4>\n<p><strong>Volunteer, Trend Micro Initiative for Education<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/16-eman.png\" alt=\"\" class=\"pull-right\">Eman El-Sheikh, PhD<\/h4>\n<p><strong>Director and Professor, Center for Cybersecurity, University of West Florida<\/strong><\/p>\n<p>Dr. Eman El-Sheikh is Director of the Center for Cybersecurity and Professor of Computer Science at the University of West Florida. Eman has extensive expertise in cybersecurity education, research and workforce development and received several awards related to cybersecurity education and diversity. She leads UWF\u2019s efforts as the NSA\/DHS National Centers of Academic Excellence in Cybersecurity Regional Hub for the Southeast U.S. and received several grants to enhance cybersecurity education and training. She teaches and conducts research related to the development and evaluation of Artificial Intelligence and Machine Learning for cybersecurity. She has published several books, including most recently, Computer and Network Security Essentials by Springer Publishing, over 75 peer-reviewed articles and given over 100 invited talks and presentations. Eman holds an M.S. and Ph.D. in Computer Science from Michigan State University.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/17-fernando.png\" alt=\"\" class=\"pull-right\">Fernando Cardoso<\/h4>\n<p><strong>Solution Architect, Trend Micro<\/strong><\/p>\n<p>Fernando Cardoso is a Solution Architect at Trend Micro and brings more than 10 years of experience working in the cybersecurity field. Previously, he worked as a Network Engineer and a Sales Engineer, with Datacenters, Cloud, DevOps, and Cybersecurity remaining the center of his passion. In the past four years, Fernando has been involved in numerous Cloud Security and DevSecOps projects.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/18-fernandos.png\" alt=\"\" class=\"pull-right\">Fernando Sampaio<\/h4>\n<p><strong>Cyber Security Sr. Manager<\/strong><\/p>\n<p>23 years of experience in Information Security and Cyber Security, responsible for leadership of big projects, security transformation programs to increasing security maturity and developing market strategy.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/18-filipi.png\" alt=\"\" class=\"pull-right\">Filipi Pires<\/h4>\n<p><strong>Research and Cybersecurity Manager, Zup Innovation<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/19-george.png\" alt=\"\" class=\"pull-right\">George Davis<\/h4>\n<p><strong>Sales Engineer, Trend Micro<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/20-gilmar.png\" alt=\"\" class=\"pull-right\">Gilmar Esteves<\/h4>\n<p><strong>CISO, Zup Innovations<\/strong><\/p>\n<p>CISO and Evangelist in Information Security at ZUP IT Innovation, passionate about sharing knowledge. Currently started a team of Cyber Security Products for the Community that serve the gaps of the companies.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/21-greg.png\" alt=\"\" class=\"pull-right\">Greg Young<\/h4>\n<p><strong>Vice President of Cybersecurity, Trend Micro<\/strong><\/p>\n<p>Greg has been working in cybersecurity for more than 30 years. He is keen on sharing the reality of security in larger organizations and how business can be done securely in those environments. As a Research Vice President with Gartner for 14 years Greg advised thousands of companies and governments on how to better secure themselves, evaluated and advised hundreds of security vendors, and has seen those same technologies successfully used, abused, put on a shelf, or pushed into a deep hole, never to be spoken of again. He led research for network security, threat trends, data center security, cloud netsec and microsegmentation. He authored more than 20 Magic Quadrants for firewall, IPS, WAF, and UTM, and was Conference Chair for 4 Security Summits.<\/p> \n<p>Greg headed several large security consulting practices, was CISO for the Department of Communications, and served as chief security architect for a security product company. He was a commissioned officer in the military police and counterintelligence branch working as a certifier\/accreditor at the national authority and received the Confederation Medal from the Governor General of Canada for his work with smart card security. Greg was named in the \u201c12 Most Powerful Security Companies\u201d and as one of \u201c100 Most Powerful Voices in Worldwide Security.\u201d And, as he mentions too often, Greg was an extra in 2 episodes of Airwolf.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/22-gregory.png\" alt=\"\" class=\"pull-right\">Gregory Hall, PhD<\/h4>\n<p><strong>Professor, University of West Florida<\/strong><\/p>\n<p>Gregory A. Hall, Ph.D. is Research Scientist at the Center for Cybersecurity, University of West Florida, and the Institute for Human and Machine Cognition, also in Pensacola, FL. He received his Ph.D. in Computer Science at the University of Idaho in 1997. He has held academic positions at the University of Idaho and Texas State University, teaching courses in software engineering and forensics.<\/p> \n<p>He holds training certificates in hacking, exploitation, incident handling, and malware reverse engineering. He worked as Intrusion Engineer at ManTech International Corporation, Chief Scientist at Endeavor Systems, Inc., Technical Lead for Harris Government Communication Systems Division, Senior Software Engineer for Endgame, and Security Manager for Accenture Federal Services.  His experience in cyber defense and malware analysis, within the private sector and also in support of the Department of Defense, has given him a unique skill set and the highest level of expertise in full spectrum cyber operations. He is a Senior Member of the IEEE.  His current interests are malware identification, intelligence-driven vulnerability analysis, Deep Learning applications in malware databases, and techniques for defeating binary diversity.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/23-hector.png\" alt=\"\" class=\"pull-right\">Hector Gomez<\/h4>\n<p><strong>Professor, University of West Florida<\/strong><\/p>\n<p >Egresado del Instituto Polit\u00e9cnico Nacional en la carrera de Ingenier\u00eda en Comunicaciones y Electr\u00f3nica, con la especialidad en redes y comunicaciones. Maestr\u00eda en Administraci\u00f3n de Tecnolog\u00edas de Informaci\u00f3n en el ITESM. >Los primeros 10 a\u00f1os de experiencia fueron en iniciativa privada, siendo consultor de redes de video, voz, datos y seguridad, obteniendo certificaciones de los productos l\u00edderes en el mercado, implement\u00e9 soluciones para importantes corporativos y Gobierno Federal.<\/p>\n<p>Los siguientes 10 a\u00f1os de experiencia fueron en cargos directivos del Gobierno Federal, dise\u00f1ando soluciones y servicios de gran importancia, para las dependencias y el pa\u00eds. En los \u00faltimos 5 a\u00f1os de este periodo, fui el CISO del Servicio de Administraci\u00f3n Tributaria de M\u00e9xico. Actualmente soy CISO en el Banco Azteca, siendo el responsable de la Seguridad de la Informaci\u00f3n de importantes Unidades de Negocio.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/24-israel.png\" alt=\"\" class=\"pull-right\">Israel Becerril Sierra<\/h4>\n<p><strong>Chief Information Security Architect, SAT<\/strong><\/p>\n<p>Computer Engineer from the Engineering School of the Universidad Nacional Aut\u00f3noma de M\u00e9xico. Computer Security Specialist Unix systems. Israel Becerril was part of computer security incident response team in the Department of Computer Security \/ UNAM-. Head of research and development in Unix OS between those who are &#8220;kernel module for host intrusion detection and management and development of the&#8221; Key Server &#8211; key server &#8220;and&#8221; Public Key Infrastructure &#8211; PKI, structured to provide services to various organizations and institutions level.s<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/25-jean.png\" alt=\"\" class=\"pull-right\">Jean Ouro<\/h4>\n<p><strong>FADBA<\/strong><\/p>\n<p>Chair of the Information Technology Management Department at FADBA, Manager of the Center for Educational Technology and Information &#8211; NUTEC, Master of Business Administration at UFBA, Specialist in Higher Education Methodology at FADBA (2008). Graduated in Industrial Engineering from the State University of Par\u00e1 (2003) and graduated in Theology &#8211; Adventist Theology Seminary &#8211; Salt (1984). He is graduated in Cinema and Multimedia Course at the Federal University of Rec\u00f4ncavo and Master in Systems and Computing at UNIFACS. He also works as a professor at Faculdade Adventistas da Bahia, in the areas of Production Management, Materials, Logistics, Project Management, English, Ethics, ICTs, Robotics, New Business, Games, Cyber Security, Entrepreneurship, small business Fair Organizer and Director of Adventist College Abroad &#8211; Brazil.  <\/p>\n<p>He has extensive experience in the IT field, producing institutional software, managing databases and working with education, in the last 24 years he has developed the area of technical and higher education, along with the business administration degree, IT Management, Executive Secretariat at FADBA \/ besides having work in the area of Marketing management, Institutional Administration and direction \/ production of audio and video, acting mainly in the educational marketing segment for a non-profit companies and developing the following themes: promotion and production. He has fluent command of the English language, having worked at Southwestern Adventist University in Texas, where he improved in the Information System area and worked as an English-Portuguese translator in events throughout Brazil and keynote speaker at universities in Brazil and the USA. <\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/26-jim.png\" alt=\"\" class=\"pull-right\">Jim Nelms<\/h4>\n<p><strong>Chief Information Security Officer, LabCorp<\/strong><\/p>\n<p>Jim Nelms is LabCorp\u2019s Chief Information Security Officer. Jim is a leading information security and risk management practitioner with more than 30 years of Information Security knowledge and expertise. His focus is on leading-edge technology, such as artificial intelligence, machine learning, and advanced analytics. He has written more than 150 journals on information security. Prior to joining LabCorp, Jim was CISO of The World Bank and then Mayo Clinic. He holds a Bachelors in Biology, a Bachelors in Information Technology, an Executive MBA and a Masters in Information Security. Jim is a transformational leader, whose philosophy is summed up by the following quote: \u201c21st- century Information Security is not what we prevent; it\u2019s what we make possible.\u201d<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/27-jon.png\" alt=\"\" class=\"pull-right\">Jon Clay<\/h4>\n<p><strong>Director, Global Threat Communications, Trend Micro<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/28-jonathan.png\" alt=\"\" class=\"pull-right\">Jonathan Javier<\/h4>\n<p><strong>CEO\/Founder, Wonsulting<\/strong><\/p>\n<p>Jonathan Javier is currently the CEO\/Founder of Wonsulting, which mission is to \u201cturn underdogs into winners\u201d. He&#8217;s also worked in the Strategy and Operations team at Snap, Google, and Cisco coming from a non-target school\/non-traditional background. He works on many initiatives, providing advice and words of wisdom on LinkedIn and through speaking engagements. In total, he has led 150+ workshops in 8 different countries including the Mena ICT Forum in Jordan, Resume\/Personal Branding at Cisco, LinkedIn Strategy &#038; Operations Offsite, Great Place To Work, Talks at Google, TEDx, and more. He&#8217;s amassed 66,000+ followers on LinkedIn in 8 months as well as 15+ million impressions yearly on his content.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/29-juan.png\" alt=\"\" class=\"pull-right\">Juan Pablo Castro<\/h4>\n<p><strong>Trend Micro<\/strong><\/p>\n<p>Director de Innovaci\u00f3n Tecnol\u00f3gica y Estrategia de Ciberseguridad para Trend Micro Latinoam\u00e9rica, cuenta con m\u00e1s de 19 a\u00f1os de experiencia en el sector de ciberseguridad y privacidad de datos. Colabora como experto en la materia para organismos internacionales como la INTERPOL y la OEA, as\u00ed como tambi\u00e9n entidades gubernamentales de seguridad nacional de diferentes pa\u00edses de Latinoam\u00e9rica, incluyendo cuerpos policiales  especializados en delitos cibern\u00e9ticos. En el \u00e1mbito acad\u00e9mico ha ejercido como docente en la Universidad de ORT de Uruguay enfocado a las \u00e1reas de telecomunicaciones en redes y datos. Como conferencista y referente en el mercado de ciberseguridad ha brindado m\u00faltiples conferencias en Latinoam\u00e9rica para diferentes sectores, destacando su participaci\u00f3n en el sector financiero, gubernamental y acad\u00e9mico.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/30-keegan.png\" alt=\"\" class=\"pull-right\">Keegan Simzer<\/h4>\n<p><strong>Associate, Trend Forward<\/strong><\/p>\n<p>I am an associate at Trend Forward Capital, the venture capital arm of Trend Micro. We invest in early and growth-stage startups across a variety of different industries, including Fintech, Healthtech, IoT, Cybersecurity, and more. Previously, I had worked in investment banking in San Francisco. I studied finance at Texas A&#038;M University and graduated in December 2019.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/31-kristin.png\" alt=\"\" class=\"pull-right\">Kristin Judge<\/h4>\n<p><strong>CEO\/President, Cybercrime Support Network<\/strong><\/p>\n<p>I am an associate at Trend Forward Capital, the venture capital arm of Trend Micro. We invest in early and growth-stage startups across a variety of different industries, including Fintech, Healthtech, IoT, Cybersecurity, and more. Previously, I had worked in investment banking in San Francisco. I studied finance at Texas A&#038;M University and graduated in December 2019.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/32-lauren.png\" alt=\"\" class=\"pull-right\">Lauren McKenna<\/h4>\n<p><strong>Global HR Director, Trend Micro<\/strong><\/p>\n<p>Lauren has been working for Trend for over 10 years in Europe and in the United States. She is a highly experienced Global Human Resources professional with over 20 + years experience gained in the Technology industry and multi-national corporations work across many diverse business environments and who works at the heart of the business.  She is passionate, results driven and an accountable individual with the drive and commitment to make a real contribution in the business on managing large change projects, Diversity, Equity &#038; Inclusion (DEI) Strategy, Talent Management, Organizational Design, Total Reward, M&#038;A, and Learning &#038; Development.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/33-leandro.png\" alt=\"\" class=\"pull-right\">Leandro Marques<\/h4>\n<p><strong>Cyber Security Manager, ITAU<\/strong><\/p>\n<p>Leandro atua na \u00e1rea de Cyber Security h\u00e1 15 anos. Apaixonado por tecnologia, j\u00e1 atuou em grandes empresas, sempre focado em defesa cibern\u00e9tica \/ Blue Team. Atualmente \u00e9 Gerente de Cyber Security do Ita\u00fa e coordenador do GT de Resposta a Incidentes da Febraban.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/34-leonardo.png\" alt=\"\" class=\"pull-right\">Leonardo Babun<\/h4>\n<p><strong>Senior Cybersecurity Researcher &#8211; Adjunct Faculty, Florida International University<\/strong><\/p>\n<p>Leonardo Babun is currently an Adjunct Faculty in the Department of Electrical and Computer Engineering and a member of the Cyber-Physical Systems Security Lab (CSL) at Florida International University. He is also a Senior Cyber-Security Researcher at the Johns Hopkins Applied Physics Laboratory at the Johns Hopkins University in Laurel, Maryland. He previously completed his M.S. in Computer Engineering and M.S. in Electrical Engineering from the Department of Electrical and Computer Engineering at Florida International University in 2019 and 2015, respectively. His research interests are focused on Cyber-Physical Systems (CPS) and the Internet of Things (IoT) security and privacy. He has over 20 technical publications in peer-reviewed cybersecurity journals and conferences, including Usenix Symposium and the Network and Distributed System Security Symposium (NDSS).<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/35-longinus.png\" alt=\"\" class=\"pull-right\">Longinus Timochenco<\/h4>\n<p><strong>CISO &#038; Director Corporate Governance, KaBuM!<\/strong><\/p>\n<p>\u00c9 CISO &#038; Diretor Governan\u00e7a Corporativa no KaBuM 27 anos em TI a frente de grandes organiza\u00e7\u00f5es, forte experi\u00eancia em tecnologia da informa\u00e7\u00e3o, Gest\u00e3o de sistemas de gest\u00e3o, seguran\u00e7a da informa\u00e7\u00e3o (SGSI), governan\u00e7a, tecnologia, gest\u00e3o de projetos nacionais e internacionais.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/36-lucy.png\" alt=\"\" class=\"pull-right\">Lucy Mari Tabuti, PhD<\/h4>\n<p><strong>Creative and Education Director, Instituto Criativo and Universidade de S\u00e3o Paulo<\/strong><\/p>\n<p>Lucy Mari \u00e9 gestora do instituto criativo, consultoria de criatividade e mentora de desenvolvimento pessoal. Pela USP, \u00e9 Doutoranda em Engenharia de Computa\u00e7\u00e3o, Mestre em Ci\u00eancia da Computa\u00e7\u00e3o, Matem\u00e1tica, Educadora, Administradora de Empresa, especialista em mentes. \u00c9 docente da Faculdade Descomplica e da Universidade Anhembi Morumbi. \u00c9 palestrante e terapeuta, amante da educa\u00e7\u00e3o e apaixonada pelo conhecimento.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/37-lydia.png\" alt=\"\" class=\"pull-right\">Lydia Chan<\/h4>\n<p><strong>Partnership Program Manager, San Jose State University<\/strong><\/p>\n<p>Lydia is a dynamic manager who has over 20+ years of experience  in the high tech industry. She started as a process engineer  and finished as a sales manager in a customer facing role at Intel. In between, she had positions in sales operation, marketing, analyst relations, factory planning, capital equipment purchasing, and even video games performance tuning!  She felt honored to be a part of the creation team in Apple  projects such as Apple TV, Macbook Air, etc.  She was a recipient of Intel\u2019s Design Win Innovation award and Intel&#8217;s top sales achievers award.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/38-malia.png\" alt=\"\" class=\"pull-right\">Malia Mason<\/h4>\n<p><strong>CyberDEI<\/strong><\/p>\n<p>Malia Mason is a United States Navy veteran, an ally, and advocate for equal representation. She is an established cybersecurity engineer and frequent conference speaker. Malia is the co-founder and CEO of Integrum, a cybersecurity consulting firm focusing on security compliance for small businesses and non-profit organizations. She is also the President and Co-Founder of CyberDEI, the former President and co-founder of the Women in Cybersecurity (WiCyS) SoCal Affiliate, as well as Chair of the Technology Committee for AnitaB.org. Malia had the distinct honor to be a community organizer for AnitaB.org\u2019s first-ever Women of Color in Tech conference in Los Angeles. She serves on the advisory board for Long Beach City College and mentors girls in middle school and high school at CyberTech Girls and GenCyber Girls.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/39-mauricio.png\" alt=\"\" class=\"pull-right\">Mauricio Zamorano<\/h4>\n<p><strong>Cloud BDM, Trend Micro<\/strong><\/p>\n<p>Telecommunications and electronics engineer graduated from ITESM<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/40-mayra.png\" alt=\"\" class=\"pull-right\">Mayra Rosario Fuentes<\/h4>\n<p><strong>Senior Researcher, Trend Micro<\/strong><\/p>\n<p>Mayra Fuentes is a Senior Threat Researcher with Trend Micro. She has more than 14 years\u2019 experience in cyber threat intelligence working for the Department of Defense, U.S. Intelligence agencies and the private sector. Ms. Fuentes has presented before for Interpol, Countermeasures, and the Counsel of Europe. Her current research interest includes underground cybercriminal forums, gaming, IoT botnets, Middle East underground, and the dark web . Ms. Fuentes is currently working on a MBA from the Kenan-Flagler Business School at the University of North Carolina Chapel Hill. She resides in Washington D.C. with her two dogs.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/41-mitchel.png\" alt=\"\" class=\"pull-right\">Mitchel Chang<\/h4>\n<p><strong>VP, CSR and Education, Trend Micro<\/strong><\/p>\n<p>Mitchel heads Trend Micro\u2019s Corporate Social Responsibility (CSR) and Initiative for Education.  To the CSR programs, he brings his passion to make the digital world safer, along with decades of industry experience and proven successes as a leader. Mitchel has been with Trend Micro since 2003, serving 11 years as Senior Vice President of Global Technical Support. As part of the executive team, he was responsible for all customer support functions, developing an internationally recognized and award-winning support team.  He also served in various cybersecurity advisory boards for several nonprofit and government initiatives such as National Cybersecurity Alliance (NCSA), Cybercrime Support Network (CSN), and NIST NICE 2019 Conference.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/42-natyelly.png\" alt=\"\" class=\"pull-right\">Natyelly Dieguez<\/h4>\n<p><strong>Regional Comtroller for LatinAmerica, PPG Industries<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/43-partha.png\" alt=\"\" class=\"pull-right\">Partha Panda<\/h4>\n<p><strong>CEO &#038; Co-Founder, Cysiv<\/strong><\/p>\n<p>Partha Panda brings more than 20 years of experience in the IT and cybersecurity industry. Over the past decade, he has held a broad range of leadership roles at Trend Micro including partner (Trend Forward Capital), SVP of strategy and corporate development, VP of business development and global alliances, and VP of global channels.Prior to that, he had leadership roles at Third Brigade (acquired by Trend Micro), Entrust, Encommerce (acquired by Entrust) and CMC Ltd. Partha holds an MBA degree from the Robert Smith School of Business at University of Maryland, a Bachelor of Engineering degree in Electronics and Telecommunication from Sambalpur University, and the Certified Information Systems Security Professional (CISSP) designation.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/44-philipe.png\" alt=\"\" class=\"pull-right\">Philipe Yoshio<\/h4>\n<p><strong>Real Protect<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/45-raul.png\" alt=\"\" class=\"pull-right\">Raul Aguilar Medina<\/h4>\n<p><strong>CISO, Grupo FarinterReal Protect<\/strong><\/p>\n<p>Perfil del Disertante: Ing en Inform\u00e1tica, aspirante al titulo de Master en Gesti\u00f3n Tecnolog\u00edas de la Informaci\u00f3n, con un certificaciones internacionales, ITIL V4, COBIT 2019, Diplomados 2019, ISO 27001, ISO 27032, Security + Comptia, y Seguridad Inform\u00e1tica. Actualmente me desempe\u00f1o como CISO en la Farmac\u00e9utica Internacional S.A. (Grupo FARINTER), con 7 a\u00f1os de experiencia en el \u00e1rea seguridad de la informaci\u00f3n en instituciones de Gobierno, Bancaria, Proveedores de Servicio, Retail y Telecomunicaciones. As\u00ed como el conocimiento y certificaciones en la implementaci\u00f3n y manejo de marcas de Seguridad Inform\u00e1tica: Palo Alto, Check Point, Fortinet, Mcafee, Entrust, Infoblox, Trend Micro; Entrust, Proofpoint, Cylance entre otras. Actualmente Leader del capitulo de OWASP y referente de DevOps en Honduras.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/46-renata.png\" alt=\"\" class=\"pull-right\">Renata Oliveira<\/h4>\n<p><strong>Sales Engineer, Trend Micro<\/strong><\/p>\n<p>Renata Oliveira is a Solution engineer committed to delivering projects aimed at the client&#8217;s needs.  You can count on their unique enthusiasm and creativity when she is solving a problem.  Working as a Solution Enginner for 8 years, with more than several satisfied customers and companies, Renata is passionate about cloud and security and my also their two canine daughters, Mell and Lola.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/47-rhett.png\" alt=\"\" class=\"pull-right\">Rhett Nieto<\/h4>\n<p><strong>Jefe de Seguridad TI, FEMSA<\/strong><\/p>\n<p>Covers security operations, blue team, vulnerability management, incident response and threat hunting processes. Teaches at Instituto Tecnol\u00f3gico y de Estudios Superiores de Monterrey (ITESM), Universidad Aut\u00f3noma de Nuevo Le\u00f3n (UANL), Universidad de La Rioja, Espa\u00f1a, Universidad Tec Milenio and Universidad Panamericana, and regularly speaks at security conferences across Latin America.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/48-rick.png\" alt=\"\" class=\"pull-right\">Rick Gomez<\/h4>\n<p><strong>Senior Advance Cloud Engineer, Microsoft<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/49-selcuk.png\" alt=\"\" class=\"pull-right\">Selcuk Uluagac<\/h4>\n<p><strong>Professor, Florida International University<\/strong><\/p>\n<p>Dr. Uluagac is currently an Associate Professor in the Department of Electrical and Computer Engineering at Florida International University (FIU), where he directs the Cyber-Physical Systems Security Lab (CSL).  Before FIU, he was a Senior Research Engineer in the School of Electrical and Computer Engineering (ECE) at Georgia Institute of Technology. Prior to Georgia Tech, he was a Senior Research Engineer at Symantec. Dr. Uluagac earned his Ph.D. from the School of ECE at Georgia Institute of Technology. He also received a M.S. in Information Security from the School of Computer Science at Georgia Institute of Technology and a M.S. from the Department of Electrical and Computer Engineering at Carnegie Mellon University. His research is on security and privacy of Internet of Things (IoT) and Cyber-Physical Systems (CPS) and has hundreds of scientific\/creative works in practical and applied aspects of these areas. <\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/50-spark.png\" alt=\"\" class=\"pull-right\">Spark Tsao<\/h4>\n<p><strong>Head of AI Lab of Coretech, Trend Micro<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/51-tonia.png\" alt=\"\" class=\"pull-right\">Tonia San Nicolas<\/h4>\n<p><strong>Associate Professor, San Jose State University<\/strong><\/p>\n<p>Tonia San Nicolas-Rocca is an Associate Professor in the School of Information at San Jose State University. She holds a PhD in Information Systems and Technology from Claremont Graduate University. Her research interests include cybersecurity, health information systems, and knowledge management. Dr. San Nicolas-Rocca has published her work in peer-reviewed research journals and conference proceedings.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/52-van.png\" alt=\"\" class=\"pull-right\">Van Souza<\/h4>\n<p><strong>Cyber Security Consultant | Threat Intelligence | Offensive Security, PwC<\/strong><\/p>\n<p>Information Security Consultant with 12 years of experience in Cyber Security, working directly with Threat Intelligence and Offensive Security. Tactical action for more effective threat intelligence, helping organizations to identify and mitigate business risks, converting unknown internal and external threats into known threats.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/53-will.png\" alt=\"\" class=\"pull-right\">Will Markow<\/h4>\n<p><strong>Managing Director &#8211; Human Capital Management and Emerging Technologies, Burning Glass Technologies<\/strong><\/p>\n<p>Will Markow is the Managing Director of Human Capital Management and Emerging Technologies at Burning Glass Technologies where he oversees Burning Glass\u2019s research and consulting efforts focused on strategic workforce planning and the impact of emerging technologies on the workforce. Will\u2019s research with Burning Glass is routinely featured in national media outlets \u2013 such as the Wall Street Journal, New York Times, and Washington Post \u2013 and he has led dozens of custom research projects for Fortune 100 companies, technology vendors, training providers, workforce development organizations, and government agencies. He has also advised multiple White House administrations on key issues related to the future of work.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/54-william.png\" alt=\"\" class=\"pull-right\">William Malik<\/h4>\n<p><strong>VP of Infrastructure Technologies, Trend Micro<\/strong><\/p>\n<p>Bill Malik\u2019s information technology career spans over four decades. Before joining Trend Micro, he was CTO of Waveset, an Identity Management vendor, from 2002 through its acquisition by Sun.  Bill worked at Gartner for twelve years where he led the Information Security service and the Application Integration and Middleware service. He was a co-author of the Cobit version 3 standard.  During his 12-year career at IBM he worked in MVS development, testing, and business planning.  Bill started programming with the John Hancock Insurance company in 1974.  He studied Mathematics at MIT.<\/p>\n\n<hr>\n\n<h4><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/speakers\/55-ximena.png\" alt=\"\" class=\"pull-right\">Ximena Cisternas<\/h4>\n<p><strong>Post Grad Professor in Cybersecurity, Universidad Adolfo Ib\u00e1\u00f1ez<\/strong><\/p>\n<p>Fomer, Falabella CISO, Top Women in Cybersecurity Latinoam\u00e9rica. Currently a Post Grad Professor at Univesity of Universidad Adolfo Ibanzez.<\/p>[\/et_pb_tab][et_pb_tab title=&#8221;English&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<p><img decoding=\"async\" loading=\"lazy\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit-en.jpg\" alt=\"\" width=\"1400\" height=\"366\" class=\"alignleft size-full wp-image-4670\" srcset=\"\/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit-en.jpg 1400w, \/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit-en-300x78.jpg 300w, \/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit-en-1024x268.jpg 1024w, \/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit-en-768x201.jpg 768w, \/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit-en-600x157.jpg 600w\" sizes=\"(max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<p>&nbsp;<\/p>\n                                    <h3>Keynote<\/h3>\n                                    <table class=\"table table-bordered table-striped table-tight\" id=\"table-tight\">\n                                        <tr class=\"tbody\">\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-marian.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Keynote: The NICE World of Cybersecurity Careers<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Marian Merritt, NIST\/NICE<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=660s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-anders.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Keynote: VR, game and simulation-based cyber security training<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=660s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Anders Gronstedt, Ph.D, President, The Gronstedt Group, Inc.<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                        <\/tr>\n                                    <\/table><br>\n                                    <h3>Track 1: Learning More About Cybersecurity Industry<\/h3>\n                                    <table class=\"table table-bordered table-striped table-tight\" id=\"table-tight\">\n                                        <tr class=\"tbody\">\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=2725s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-daniel.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Fireside Chat \u2013 Cybersecurity Education and Industry Needs<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=2725s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Daniel Eliot, Director of Education &#038; Strategic Initiatives, National Cybersecurity Alliance <br>Tonia San Nicolas, Associate Professor, San Jose State University <br>Marian Merritt, NIST\/NICE <br>Eman El-Sheikh, Ph.D., Associate Professor, San Jose State University <br>Kristin Judge, CEO\/President, Cybercrime Support Network<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=6000s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-alyssa.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>CISO Roundtable &#8211; Cybersecurity Opportunities, CISO&#8217;s Perspective<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=6000s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>William Malik, VP of Infrastructure Technologies, Trend Micro <br>Ed Cabrera, Chief Cybersecurity Officer, Trend Micro <br>Alyssa Miller, Application Security Advocate, Snyk Ltd. <br> Greg Young, Vice President of Cybersecurity, Trend Micro <br>Jim Nelms, Chief Information Security Officer, LabCorp<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=9594s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-jon.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>2020 Threat Landscape and Defense Strategy<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=9594s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Jon Clay, Director, Global Threat Communications, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=11370s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-spark2.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Cybersecurity Defense by AI and Machine Learning<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=11370s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Spark Tsao, Head of AI Lab of Coretech, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                        <\/tr>\n                                    <\/table> <br>\n                                    <h3>Track 2: Career Opportunity Discovery<\/h3>\n                                    <table class=\"table table-bordered table-striped table-tight\" id=\"table-tight\">\n                                        <tr class=\"tbody\">\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=vN40NYVvQHo\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-will.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Hack the Gap: Tracking Cybersecurity Career Opportunities with CyberSeek.org<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=vN40NYVvQHo\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Will Markow <br> Managing Director &#8211; Human Capital Management and Emerging Technologies, Burning Glass Technologies<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=vN40NYVvQHo&#038;t=1892s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-lauren.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Close the Gap &#8211; Our next generation Cyber Security Professionals<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=vN40NYVvQHo&#038;t=1892s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Lauren McKenna<br>Global HR Director, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=vN40NYVvQHo&#038;t=3519s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-malia.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>CyberDEI &#8211; Going Beyond Advocacy<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=vN40NYVvQHo&#038;t=3519s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Malia Mason <br> CyberDEI<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=vN40NYVvQHo&#038;t=5438s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-keegan.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Looking at the widespread opportunities a career in cybersecurity offers\n                                                            <\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=vN40NYVvQHo&#038;t=5438s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Keegan Simzer <br> Associate, Trend Forward <br>Partha Panda<br>CEO &#038; Co-Founder, Cysiv<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                        <\/tr>\n                                    <\/table> <br>\n                                    <h3>Track 3: Information Exchange and Networking<\/h3>\n                                    <table class=\"table table-bordered table-striped table-tight\" id=\"table-tight\">\n                                        <tr class=\"tbody\">\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-alan.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>SJSU Sharing, Cybersecurity Community Outreach Projects<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Lydia Chan, Partnership Program Manager, San Jose State University <br>\n                                                                Alan Wong, PhD, Director, Silicon Valley Center for Global Studies, San Jose State University<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig&#038;t=1363s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-gregory.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>UWF Sharing: Cyber Threats Modeling and Simulation<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig&#038;t=1363s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Lauren McKenna<br>Global HR Director, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig&#038;t=2815s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-selcuk.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Understanding the IoT Threat Landscape &#038; FIU Cybersecurity Project Sharing<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig&#038;t=2815s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Selcuk Uluagac, Professor, Florida International University<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig&#038;t=4568s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-jonathan.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Breaking Into Your Dream Career<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig&#038;t=4568s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Jonathan Javier, CEO\/Founder, Wonsulting<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig&#038;t=6013s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-george.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Securing Cloud Native Applications<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=s2L18W3ovig&#038;t=6013s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>George Davis, Sales Engineer, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                        <\/tr>\n                                    <\/table> <br>\n                                    <h3>Closing Remarks<\/h3>\n                                    <table class=\"table table-bordered table-striped table-tight\" id=\"table-tight\">\n                                        <tr class=\"tbody\">\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=13622s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-en-mitchel.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Closing and Raffle Prize Drawings<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=aWx-w9_6ses&#038;t=13622s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Mitchel Chang, VP Cybersecurity Education and CSR, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                        <\/tr>\n                                    <\/table> [\/et_pb_tab][et_pb_tab title=&#8221;Portuguese&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"d-none d-lg-block d-xl-block\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit-pt.jpg\" \/><\/p><br>\n<table class=\"table table-bordered table-striped table-tight\" id=\"table-tight\">\n                                        <tr class=\"tbody\">\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=0s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-pt-elwyn.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Getting Ready<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=0s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=826s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-pt-renata.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div> \n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Welcoming Attendees<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=826s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Andre Alves, Cloud Security Architect, Trend Micro <br>Renata Oliveira, Sales Engineer, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=1888s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-pt-claudia.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Panel Qualified Talent for Cybersecurity Market<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=1888s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Longinus Timochenco, CISO &#038; Director Corporate Governance, KaBuM! <br>Claudia Anania, CIO, Instituto Butantan<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=3300s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-pt-amanda.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Round Table CPITS Brasil Alumni<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=3300s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Amanda Veras, Sales Engineer, Trend Micro <br>\n                                                                Philipe Yoshio, Real Protect <br>\n                                                                Van Souza, Cyber Security Consultant, PwC<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=5456s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-pt-fernando.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>How I made the impossible, possible!<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=5456s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Fernando Cardoso, Solution Architect, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=6660s\" target=\"_blannk\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-pt-danielm.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Daniel Mauser, minha jornada do Brasil para o mundo da n\u00favem<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=6660s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Daniel Mauser, Microsoft Global Black Belts, Microsoft<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=9143s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-pt-bruno.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Cybersecurity careers today &#8211; Round Table <\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=9143s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Bruno Diniz, Chief Services and Operations Officer at Logical IT, Logical IT <br>\n                                                                Fernando Sampaio, Cyber Security Sr. Manager <br>\n                                                                Leandro Marques, Cyber Security Manager, ITAU<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=10939s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-pt-filipi.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>ZUP IT Innovation &#8211; A company focus on serving the Cybersecurity community<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=10939s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Filipi Pires, Research and Cybersecurity Manager, Zup Innovation br   \n                                                                Gilmar Esteves, CISO, Zup Innovations<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=12821s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-pt-lucy.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Creative Balance Journey of Challenges and Innovation Center Education<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=e68kmHCGKZk&#038;t=12821s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Lucy Mari Tabuti, PhD, Creative and Education Director, Instituto Criativo and Universidade de S\u00e3o Paulo<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                        <\/tr>\n                                    <\/table>[\/et_pb_tab][et_pb_tab title=&#8221;Spanish&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"d-none d-lg-block d-xl-block\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit-en.jpg\" \/><\/p><br>\n<table class=\"table table-bordered table-striped table-tight\" id=\"table-tight\">\n                                        <tr class=\"tbody\">\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-es-boris.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Bienvenida, Boris Vasquez su recorrido en el apasionante mundo de la ciberseguridad<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=1770s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-es-juan.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div> \n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Mesa redonda una conversacion con CISO<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=1770s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Juan Pablo Catro, Trend Micro <br>Hector Gomez, CISO, Banco Azteca <br> Ximena CIsternas, PostGrad Professor in Cybersecurity, Universidad Adolfo Ib\u00e1\u00f1ez <br> Raul Aguilar Medina, CISO, Grupo Farinter <br>Ed Cabrera, Chief Cybersecurity Officer, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=4015s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-es-antonio.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Conversacion con Antonino Cano del Trend Forward Capital<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=4015s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Antonio Cano, Operations Partner, Trend Forward Capital<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=5882s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-es-mauricio.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Israel Becerril y Rhett Nieto abordan el tema de la implementacion de un programa de ciberseguridad en el sector publico vs privado, Moderador Mauricio Zambrano<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=5882s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Mauricio Zamorano, Cloud BDM, Trend Micro <br>Israel Becerril Sierra, Chief Information Security Architect, SAT <br> Rhett Nieto, Jefe de Seguridad TI at FEMSA, FEMSA<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=7718s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-es-natyelly.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Natyeli Dieguez &#8211; Su trajectoria y la vision de ciberseguridad del lado del negocio<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=7718s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Natyelly Dieguez, Regional Comtroller for LatinAmerica, PPG Industries<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=9416s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-es-leonardo.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Leonardo Babun, Ph.D. \u202f- A pesar de todo lo dem\u00e1s, sigo eligiendo la ciberseguridad<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=9416s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKER <br>Leonardo Babun, Senior Cybersecurity Researcher &#8211; Adjunct Faculty, Florida International University<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=12120s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-es-rick.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Rick Gomez, Carlos Aguilar nos cuentan de su trayectoria y como llegaron a ser parte de una de las empresas m\u00e1s reconocidas del mundo <\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=12120s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Carlos Aguilar, Technical Specialist &#8211; Security &#038; Compliance, Microsoft <br>Rick Gomez, Senior Advance Cloud Engineer, Microsoft<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                            <tr>\n                                                <td>\n                                                    <div class=\"row\">\n                                                        <div class=\"text-center col-xs-12 col-md-3 td-thumbnail\">\n                                                            <a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=13708s\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/screenshots\/speaker-es-mayra.jpg\" alt=\"\" width=\"200\"><\/a>\n                                                        <\/div>\n                                                        <div class=\"col-xs-12 col-md-9 td-body\">\n                                                            <h4>Mayra Rosario su trayectoria en ciberseguridad y su ultimo proyectos como el Covid en el submundo<\/h4>\n                                                            <p><a href=\"https:\/\/www.youtube.com\/watch?v=nmCUHD6N0XQ&#038;t=13708s\" target=\"_blank\" rel=\"noopener\">Watch recording<i class=\"fas fa-chevron-right fa-right\"><\/i><\/a><\/p>\n                                                            <p>SPEAKERS <br>Mauricio Zamorano, Cloud BDM, Trend Micro <br>Mayra Rosario Fuentes, Senior Researcher, Trend Micro<\/p>\n                                                        <\/div>\n                                                    <\/div>\n                                                <\/td>\n                                            <\/tr>\n                                        <\/tr>\n                                    <\/table>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#eeeeee&#8221; background_color_gradient_end=&#8221;#f7f9f9&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"sb-section sb-contact\">\r\n    <div class=\"row\">\r\n        <div class=\"col-12 col-md-12 col-lg-8 offset-lg-2\">\r\n            <h3 class=\"text-center interstate\">Partner With Us<\/h3>\r\n            <p class=\"p-f18 text-center\">\r\n                By working together, academia and industry can bridge the cybersecurity skills gap\u2014producing graduates who are ready to defend against cyber threats from day one. If you\u2019re an educator or institution looking to strengthen your cybersecurity programs, join Trend Cybersecurity ConnectED and help shape the future of cybersecurity in the Philippines.\r\n                <br><br>\r\n                <strong>Let\u2019s get connected.<\/strong> <br>Email us at \r\n                <a href=\"mailto:csr_education@trendmicro.com?Subject=[Cybersecurity ConnectED] \">csr_education@trendmicro.com<\/a>.\r\n            <\/p>\r\n\t<p class=\"p-f16 text-center\">\r\n\t<a href=\"https:\/\/www.facebook.com\/TrendMicroCareersPH\" target=\"_blank\" class=\"btn btn-primary a-cta\">\r\n        <i class=\"fa-brands fa-facebook\"><\/i>\/TrendMicroCareersPH\r\n    <\/a>\r\n\t<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n<hr style=\"margin:40px 0;\">\r\n\r\n<div class=\"sb-footer\">\r\n    <div class=\"row\">\r\n        <div class=\"issb col-12 col-md-12 col-lg-6 offset-lg-2\">\r\n            <h5>Trend Cybersecurity ConnectED<\/h5>\r\n        <\/div>\r\n        <div class=\"tm col-12 col-md-12 col-lg-3\">\r\n            <h5>\r\n                <a href=\"https:\/\/www.trendmicro.com\/\" target=\"_blank\" title=\"Go to TrendMicro.com\" rel=\"noopener noreferrer\">\r\n                    <img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/2020\/05\/trend-micro-logo.png\" alt=\"Trend Micro logo\" width=\"150\" style=\"max-width: 150px !important;\">\r\n                <\/a>\r\n            <\/h5>\r\n            <ul class=\"footer-ul\">\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/\">TrendMicro.com<\/a><\/li>\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/en_ph\/about\/legal.html\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Policy<\/a><\/li>\r\n            <\/ul>\r\n        <\/div>\r\n    <\/div>  \r\n<\/div>\r\n[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;#f7f9f9&#8243; global_colors_info=&#8221;{}&#8221; use_background_color_gradient__hover=&#8221;off&#8221; use_background_color_gradient__hover_enabled=&#8221;off&#8221; background_color_gradient_start__hover=&#8221;#2b87da&#8221; background_color_gradient_start__hover_enabled=&#8221;#2b87da&#8221; background_color_gradient_end__hover=&#8221;#29c4a9&#8243; background_color_gradient_end__hover_enabled=&#8221;#29c4a9&#8243; background_color_gradient_type__hover=&#8221;linear&#8221; background_color_gradient_type__hover_enabled=&#8221;linear&#8221; background_color_gradient_direction__hover=&#8221;180deg&#8221; background_color_gradient_direction__hover_enabled=&#8221;180deg&#8221; background_color_gradient_direction_radial__hover=&#8221;center&#8221; background_color_gradient_direction_radial__hover_enabled=&#8221;center&#8221; background_color_gradient_start_position__hover=&#8221;0%&#8221; background_color_gradient_start_position__hover_enabled=&#8221;0%&#8221; background_color_gradient_end_position__hover=&#8221;100%&#8221; background_color_gradient_end_position__hover_enabled=&#8221;100%&#8221; background_color_gradient_overlays_image__hover=&#8221;off&#8221; background_color_gradient_overlays_image__hover_enabled=&#8221;off&#8221; parallax__hover=&#8221;off&#8221; parallax__hover_enabled=&#8221;off&#8221; parallax_method__hover=&#8221;on&#8221; parallax_method__hover_enabled=&#8221;on&#8221; background_size__hover=&#8221;cover&#8221; background_size__hover_enabled=&#8221;cover&#8221; background_position__hover=&#8221;center&#8221; background_position__hover_enabled=&#8221;center&#8221; background_repeat__hover=&#8221;no-repeat&#8221; background_repeat__hover_enabled=&#8221;no-repeat&#8221; background_blend__hover=&#8221;normal&#8221; background_blend__hover_enabled=&#8221;normal&#8221; allow_player_pause__hover=&#8221;off&#8221; allow_player_pause__hover_enabled=&#8221;off&#8221; background_video_pause_outside_viewport__hover=&#8221;on&#8221; background_video_pause_outside_viewport__hover_enabled=&#8221;on&#8221;][et_pb_fullwidth_image src=&#8221;\/internet-safety\/wp-content\/uploads\/2021\/05\/charity-23.png&#8221; _builder_version=&#8221;3.17.6&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_slide=&#8221;4%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_image][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>2020 TMIE Virtual Cybersecurity Summit for University StudentsCheck out the recordings from our 2020 Virtual Cybersecurity Summit. Objectives The TMIE Virtual Cybersecurity Summit for University Students is organized and sponsored by Trend Micro Initiative for Education \u2013 a community cybersecurity education outreach program. Our goal is to initiate cybersecurity knowledge sharing and stimulate students\u2019 interest [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":3931,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"\u00a0\r\n<div class=\"uni-section uni-banner\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 text-center\"><img class=\"visible-md visible-lg\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/banner-university-homepage.jpg\" alt=\"\" \/>\r\n<img class=\"visible-xs visible-sm\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/banner-university-homepage-720.jpg\" alt=\"\" \/><\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"sb-section sb-about uni-section uni-overview\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12\">\r\n<h3 class=\"text-center\">Overview<\/h3>\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-12 col-lg-5\">\r\n<h4>Collaborating with schools<\/h4>\r\nWe established the <strong>Cybersecurity Education for Universities<\/strong> program to help address the gap by offering guidance, expertise, and support to college cybersecurity programs free of charge. We work collaboratively with schools, typically focusing on one or more of the following areas:\r\n<ul class=\"font13\">\r\n \t<li><strong>Faculty enablement and training<\/strong>\r\n\u201cTraining the Trainers,\u201d we ensure educators have accurate, useful information that follows best practices as researched by our subject matter experts.<\/li>\r\n \t<li><strong>Curriculum alignment and course consultation<\/strong>\r\nEnsuring that subjects remain relevant and accurate, addressing critical concepts in the fast-evolving world of technology and cybercrime.<\/li>\r\n \t<li><strong>Technical seminars & webinars<\/strong>\r\nWe provide technical seminars and webinars as requested by students and faculty to keep their knowledge up-to-date with the latest discoveries by our experts. We also offer speaking engagements led by Trend\u2019s cybersecurity professionals.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"col-xs-12 col-md-12 col-lg-7 text-center\" style=\"margin: 6rem 0;\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/university-dlsu-class.jpg\" alt=\"Trend Micro's Cybersecurity Education for Universities - A class at De La Salle University in Manila,\" \/>\r\n<span class=\"font13\">Fundamentals of Cybersecurity class at De La Salle University in Manila, Philippines<\/span><\/div>\r\n<\/div>\r\n<\/div>\r\n<!--.uni-overview-->\r\n<a name=\"participants\"><\/a>\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-section sb-contact uni-partners\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-12 col-lg-8 col-lg-offset-2\">\r\n<h3 class=\"text-center\">Participants & Partners<\/h3>\r\n<strong>We launched a pilot of our <strong>Cybersecurity Education for Universities<\/strong> program in the Philippines in 2017 with 3 universities and are excited to continue working with them and our newest participants!<\/strong>\r\n\r\nSome of our recent outreach efforts include an expert-led course on the introduction to cybersecurity and training on the \u201cFundamentals of Malware Awareness\u201d and \u201cPython & Big Data.\u201d\r\n\r\nWhile much of our work with partner universities is aimed at training and curriculum alignment, we also offer expert guest speakers, sponsorships for cybersecurity events, and donation of materials.\r\n\r\nIf you are interested in learning more about our program or becoming a participant, contact us!\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-fiu.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-nyu.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-ucdavis.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-sjsu.jpg?v=2\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-stu.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-utd.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-ucd.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-uwf.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-uwfcenter.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-naif.jpg?v=2\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-apc.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-admu.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-dlsu.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-nu.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-pup.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-slu.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-uap.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/school-ust.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/partner-ncsa.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/partner-nist.jpg\" alt=\"\" \/><\/div>\r\n<div class=\"col-xs-6 col-sm-4 col-md-3 col-lg-2 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/partner-nice.jpg\" alt=\"\" \/><\/div>\r\n<\/div>\r\n<\/div>\r\n<!--.uni-partners-->\r\n<a name=\"events\"><\/a>\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-section sb-past uni-section uni-past\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12\">\r\n<h3 class=\"text-center\">Events<\/h3>\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-12 col-lg-8 col-lg-offset-2\">\r\n<div class=\"\">\r\n<table class=\"table table-bordered table-striped table-sb-schedule\">\r\n<tbody>\r\n<tr class=\"\">\r\n<td><article><img class=\"alignnone wp-image-5647 size-large\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/trend-micro-event-cybersecurity-threats-career-opportunities-1-1024x512.jpg\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"\/internet-safety\/wp-content\/uploads\/university\/images\/trend-micro-event-cybersecurity-threats-career-opportunities-1-1024x512.jpg 1024w, \/internet-safety\/wp-content\/uploads\/university\/images\/trend-micro-event-cybersecurity-threats-career-opportunities-1-300x150.jpg 300w, \/internet-safety\/wp-content\/uploads\/university\/images\/trend-micro-event-cybersecurity-threats-career-opportunities-1-768x384.jpg 768w, \/internet-safety\/wp-content\/uploads\/university\/images\/trend-micro-event-cybersecurity-threats-career-opportunities-1-600x300.jpg 600w, \/internet-safety\/wp-content\/uploads\/university\/images\/trend-micro-event-cybersecurity-threats-career-opportunities-1.jpg 1200w\" alt=\"\" width=\"1024\" height=\"512\" \/>\r\n<h4>Cybersecurity Threats and Career Opportunities<\/h4>\r\n<p class=\"date\" style=\"margin-left: 15px !important;\"><i class=\"fa fa-calendar fa-left\"><\/i><time datetime=\"2021-08-26\">August 25, 2021<\/time>\r\n<!--<i class=\"fa fa-clock-o fa-left\"><\/i><time datetime=\"2021-08-26 21:00\">9:00 PM ET | 8:00 AM GMT+4 | 6:00 AM CET<\/time>-->\r\n<i class=\"fa fa-clock-o fa-left\"><\/i><time datetime=\"2021-08-25 10:00\">10:00<\/time> AM ET | <time datetime=\"2021-08-25 15:00\">3:00<\/time> PM GMT | <time datetime=\"2021-08-25 18:00\">6:00<\/time> PM Dubai | <time datetime=\"2021-08-25 22:00\">10:00<\/time> PM Manila<\/p>\r\n<p class=\"\" style=\"font-size: 13px !important; line-height: 18px;\"><strong>Event Panelists<\/strong>\r\nJonathan Chang, Senior Partner, Trend Forward Capital \u2013 USA\r\nJoahnna Hipolito, Manager of Technology Marketing, Trend Micro Research \u2013 Philippines\r\nEvan Palmer, Associate Professor of Psychology, San Jos\u00e9 State University \u2013 USA\r\nBrook Stein, Director of Product and Business Development, Trend Micro \u2013 USA<\/p>\r\n<p class=\"text-smaller \" style=\"margin-bottom: 10px;\"><a class=\"text-cta text-uppercase\" href=\"https:\/\/www.localized.world\/events\/391\/new-cybersecurity-threats-and-career-opportunities\" target=\"_blank\" rel=\"noopener noreferrer\">Register<i class=\"fa fa-chevron-right fa-right\"><\/i><\/a><\/p>\r\n<p class=\"text-smaller \"><a class=\"text-cta text-uppercase\" href=\"\/internet-safety\/wp-content\/uploads\/university\/images\/TMIE-August-25-2021-Cybersecurity-Careers-University-Webinar.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Download Event Flyer (PDF)<i class=\"fa fa-chevron-right fa-right\"><\/i><\/a><\/p>\r\n\r\n<\/article><\/td>\r\n<\/tr>\r\n<tr class=\"\">\r\n<td><article><img class=\"alignnone size-full wp-image-5720\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-CTF-2021-banner.jpg\" sizes=\"(max-width: 1200px) 100vw, 1200px\" srcset=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-CTF-2021-banner.jpg 1200w, \/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-CTF-2021-banner-300x150.jpg 300w, \/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-CTF-2021-banner-1024x512.jpg 1024w, \/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-CTF-2021-banner-768x384.jpg 768w, \/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-CTF-2021-banner-600x300.jpg 600w\" alt=\"\" width=\"1200\" height=\"600\" \/>\r\n<h4>Trend Micro Capture the Flag 2021 \u2013 Raimund Genes Cup<\/h4>\r\n<p style=\"margin-bottom: 10px;\">Our 7th annual Capture the Flag (CTF) cybersecurity competition is a global, knowledge-based challenge to create a safer digital world!<\/p>\r\nRegister your team for the online qualifier, and you could compete in the final competition for the prize of <strong style=\"color: #cc0000;\">JPY 1,000,000<\/strong> (approximately USD 9,000) and more.\r\n<p class=\"date\" style=\"margin-left: 15px !important;\"><i class=\"fa fa-calendar fa-left\"><\/i>Online Qualifier \u2013 September 18-19, 2021 (Japan Standard Time)<\/p>\r\n<p class=\"date\" style=\"margin-left: 15px !important; margin-bottom: 30px !important;\"><i class=\"fa fa-calendar fa-left\"><\/i>Virtual Final \u2013 December 18-19, 2021 (Online)<\/p>\r\n<p class=\"text-smaller \" style=\"margin-bottom: 10px !important;\"><a class=\"text-cta text-uppercase\" href=\"https:\/\/www.trendmicro.com\/en_us\/campaigns\/capture-the-flag.html\" target=\"_blank\" rel=\"noopener noreferrer\">Learn More<i class=\"fa fa-chevron-right fa-right\"><\/i><\/a><\/p>\r\n<p class=\"text-smaller \"><a class=\"text-cta text-uppercase\" href=\"https:\/\/www.trendmicro.com\/en_us\/campaigns\/capture-the-flag\/register.html\" target=\"_blank\" rel=\"noopener noreferrer\">Register<i class=\"fa fa-chevron-right fa-right\"><\/i><\/a><\/p>\r\n\r\n<\/article><\/td>\r\n<\/tr>\r\n<tr class=\"\">\r\n<td><article><img class=\"alignnone size-full wp-image-5675\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/nist-cybersecurity-career-week-2021.png\" sizes=\"(max-width: 1798px) 100vw, 1798px\" srcset=\"\/internet-safety\/wp-content\/uploads\/university\/images\/nist-cybersecurity-career-week-2021.png 1798w, \/internet-safety\/wp-content\/uploads\/university\/images\/nist-cybersecurity-career-week-2021-300x112.png 300w, \/internet-safety\/wp-content\/uploads\/university\/images\/nist-cybersecurity-career-week-2021-1024x384.png 1024w, \/internet-safety\/wp-content\/uploads\/university\/images\/nist-cybersecurity-career-week-2021-768x288.png 768w, \/internet-safety\/wp-content\/uploads\/university\/images\/nist-cybersecurity-career-week-2021-1536x576.png 1536w, \/internet-safety\/wp-content\/uploads\/university\/images\/nist-cybersecurity-career-week-2021-600x225.png 600w\" alt=\"\" width=\"1798\" height=\"674\" \/>\r\n<h4>NIST National Initiative for Education (NICE)\r\nCybersecurity Career Awareness Week<\/h4>\r\n<p class=\"date\" style=\"margin-left: 15px !important;\"><i class=\"fa fa-calendar fa-left\"><\/i>October 18-23, 2021<\/p>\r\n<p class=\"text-smaller \"><a class=\"text-cta text-uppercase\" href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/events\/cybersecurity-career-awareness-week\" target=\"_blank\" rel=\"noopener noreferrer\">Learn More<i class=\"fa fa-chevron-right fa-right\"><\/i><\/a><\/p>\r\n\r\n<\/article><\/td>\r\n<\/tr>\r\n<tr class=\"\">\r\n<td><article><img class=\"alignnone wp-image-5647 size-large\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/summit-2021-banner.jpg\" alt=\"\" width=\"1024\" height=\"512\" \/>\r\n<h4>Trend Micro Initiative for Edcation (TMIE)\r\n2021 Virtual Cybersecurity Summit for University Students<\/h4>\r\n<p class=\"date\" style=\"margin-left: 15px !important;\"><i class=\"fa fa-calendar fa-left\"><\/i>October 19, 2021 \u2013 Global English sessions\r\n<i class=\"fa fa-calendar fa-left\"><\/i>October 20, 2021 \u2013 Global English sessions\r\n<i class=\"fa fa-calendar fa-left\"><\/i>October 21, 2021 \u2013 Spanish and Portuguese for Latin America<\/p>\r\n<p class=\"text-smaller \" style=\"margin-bottom: 10px;\"><a class=\"text-cta text-uppercase\" href=\"\/university\/events\/2021-summit\" target=\"_blank\" rel=\"noopener noreferrer\">Learn more<i class=\"fa fa-chevron-right fa-right\"><\/i><\/a><\/p>\r\n\r\n<\/article><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<div class=\"row\">\r\n<div class=\"col-xs-12\">\r\n<h3 class=\"text-center\">Past Events<\/h3>\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\" style=\"margin-bottom: 40px;\">\r\n<div class=\"col-xs-12 col-lg-6 text-center\" style=\"margin: 1rem 0 0 0;\">\r\n\r\n<img class=\"aligncenter size-full wp-image-5583\" src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Cybersecurity-Challenges-and-Opportunities.jpg\" sizes=\"(max-width: 1200px) 100vw, 1200px\" srcset=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Cybersecurity-Challenges-and-Opportunities.jpg 1200w, \/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Cybersecurity-Challenges-and-Opportunities-300x150.jpg 300w, \/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Cybersecurity-Challenges-and-Opportunities-1024x512.jpg 1024w, \/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Cybersecurity-Challenges-and-Opportunities-768x384.jpg 768w, \/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Cybersecurity-Challenges-and-Opportunities-600x300.jpg 600w\" alt=\"\" width=\"auto\" height=\"auto\" \/>\r\n\r\n<\/div>\r\n<div class=\"col-xs-12 col-lg-6\" style=\"margin: 2rem 0 0 0;\">\r\n\r\nCybersecurity Challenges and Opportunities\r\nJune 26, 2021\r\n\r\n<strong>Panelists:<\/strong>\r\nRodel Villarez, Cybersecurity Education Manager, Trend Micro\r\nJo Pillay, Employee Relations and Experience Manager, Trend Micro\r\nMark Batchelor, VP of Community Based Programs, Cybercrime Support Network (CSN)\r\nMitchel Chang, VP of CSR and Education, Trend Micro\r\n\r\n<a class=\"btn btn-danger\" href=\"https:\/\/www.localized.world\/events\/367\/cybersecurity-challenges-and-opportunities-with-trend-micro\" target=\"_blank\" rel=\"noopener\">Watch recording<\/a>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-lg-5\">\r\n\r\nDecember 17-19, 2020\r\n<a href=\"https:\/\/www.svcsi.online\/sv-cybersecurity-conf\" target=\"_blank\" rel=\"noopener\">Silicon Valley Cybersecurity Institute (SVCI) Conference 2020<\/a>\r\n<a href=\"https:\/\/youtu.be\/4M5SQX-r-TA\" target=\"_blank\" rel=\"noopener\">Tutorial Session: Cybersecurity in Digital Transformation by Trend Micro volunteers<\/a>\r\n\r\nNovember, 2020\r\n<a href=\"https:\/\/www.sjsu.edu\/cybersecurity\/events\/index.html\" target=\"_blank\" rel=\"noopener\">San Jose State University CyberAware Day 2020<\/a>\r\n\r\nNovember 10-11, 2020\r\n<a href=\"\/internet-safety\/university\/events\/2020-summit\">2020 TMIE Virtual Cybersecurity Summit for University Students<\/a>\r\n\r\nOctober \u2013 November, 2020\r\n<a href=\"https:\/\/niceconference.org\/2020\" target=\"_blank\" rel=\"noopener\">Virtual NICE Conference and Expo 2020<\/a>\r\n\r\n<\/div>\r\n<div class=\"col-xs-12 col-lg-7 text-center\" style=\"margin: 1rem 0 0 0;\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/banner-summit.jpg\" alt=\"Trend Micro's Virtual Cybersecurity Summit for University Students\" \/><\/div>\r\n<\/div>\r\n<\/div>\r\n<!--.sb-past-->\r\n<a name=\"volunteers\"><\/a>\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-section sb-past uni-section\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 text-center\">\r\n<h3>Education Outreach in Action<\/h3>\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-sm-12 col-md-4 col-lg-4\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Lynette-Owens-at-Safer-Internet-Day-2020.jpg\" alt=\"Trend Micro's Lynette Owens speaks at Safer Internet Day 2020\" \/>\r\n<span class=\"font13\">Lynette Owens speaks at Safer Internet Day 2020 <\/span><\/div>\r\n<div class=\"col-xs-12 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Mitchel-Chang-at-Florida-State-University.jpg\" alt=\"Trend Micro's Will Waters and Mitchel Chang visiting Professor Mary Ho at FSU\u2019s Cybersecurity Club\" \/>\r\n<span class=\"font13\">Will Waters and Mitchel Chang visiting Professor Mary Ho at FSU\u2019s Cybersecurity Club<\/span><\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-12 col-sm-12 col-md-8 col-lg-8\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-6 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Mitchel-Chang-at-NCSA-San-Jose-Workshop-March-2019.jpg\" alt=\"Trend Micro's Mitchel Chang participates in a panel discussion at NCSA Cybersecure My Business workshop \" \/>\r\n<span class=\"font13\">Mitchel Chang participates in a panel discussion at NCSA Cybersecure My Business workshop <\/span><\/div>\r\n<div class=\"col-xs-12 col-md-6 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Hernan-Armbruster-at-NIST-NICE-Summit-2018.jpg\" alt=\"Trend Micro's Hernan Armbruster sharing Trend Micro career programs at the NIST NICE Conference\" \/>\r\n<span class=\"font13\">Hernan Armbruster sharing Trend Micro career programs at the NIST NICE Conference<\/span><\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-6 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-Felix-Sterling-at-San-Jose-State-University.jpg\" alt=\"Trend Micro's Felix Sterling speaks at San Jose State University\u2019s Cybersecurity Day\" \/>\r\n<span class=\"font13\">Felix Sterling speaks at San Jose State University\u2019s Cybersecurity Day<\/span><\/div>\r\n<div class=\"col-xs-12 col-md-6 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/Trend-Micro-volunteers-with-incoming-college-students.jpg\" alt=\"Trend Micro volunteers discussing cybersecurity career with incoming college students\" \/>\r\n<span class=\"font13\">Trend Micro volunteers discussing cybersecurity career with incoming college students<\/span><\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 text-center\"><img src=\"\/internet-safety\/wp-content\/uploads\/university\/images\/banner-university-training.jpg\" alt=\"Trend Micro's Rodel Villarez conducts Training the Trainers with university professors in the Philippines\" \/>\r\n<span class=\"font13\">Rodel Villarez conducts Training the Trainers with university professors in the Philippines<\/span><\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<!--.uni-section-->\r\n<a name=\"contact\"><\/a>\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-section sb-contact uni-contact\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-12 col-lg-8 col-lg-offset-2\">\r\n<h3 class=\"text-center\">Contact Us<\/h3>\r\n<p class=\"text-center\">For inquiries about <strong>Cybersecurity Education for Universities<\/strong>, if you are interested in partnering with us, or if you belong to a school or an organization that would benefit from cybersecurity enablement workshops, contact us at <a href=\"mailto:csr_education@trendmicro.com?Subject=CEU\">csr_education@trendmicro.com<\/a>.<\/p>\r\n<p class=\"text-center\"><a class=\"btn btn-danger\" href=\"\/internet-safety\/university\/contact-us\">Send us a message<\/a><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<!--.uni-contact-->\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-footer uni-footer\">\r\n<div class=\"row\">\r\n<div class=\"issb col-xs-12 col-sm-12 col-md-12 col-lg-6 col-lg-offset-2\">\r\n<h5>Cybersecurity Education for Universities<\/h5>\r\n<ul class=\"sb-footer-ul\">\r\n \t<li><a href=\"\/internet-safety\/university\">Home<\/a><\/li>\r\n \t<li><a href=\"\/internet-safety\/university\/events\/2020-summit\">2020 Cybersecurity Summit<\/a><\/li>\r\n \t<li><a href=\"\/internet-safety\/university\/events\/2021-summit\">2021 Cybersecurity Summit<\/a><\/li>\r\n \t<li><a href=\"\/internet-safety\/university\/contact-us\">Contact Us<\/a><\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"tm col-xs-12 col-md-12 col-lg-2\">\r\n<h5><a title=\"Go to TrendMicro.com\" href=\"https:\/\/www.trendmicro.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img style=\"max-width: 150px !important;\" src=\"\/internet-safety\/wp-content\/uploads\/2020\/05\/trend-micro-logo.png\" alt=\"Trend Micro logo\" width=\"150\" \/><\/a><\/h5>\r\n<ul class=\"sb-footer-ul\">\r\n \t<li><a href=\"https:\/\/www.trendmicro.com\/\">TrendMicro.com<\/a><\/li>\r\n \t<li><a href=\"https:\/\/www.trendmicro.com\/en_gb\/about\/legal.html\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Policy<\/a><\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<\/div>","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"class_list":["post-6398","page","type-page","status-publish","hentry","no-wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/6398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=6398"}],"version-history":[{"count":1,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/6398\/revisions"}],"predecessor-version":[{"id":37075,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/6398\/revisions\/37075"}],"up":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/3931"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=6398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}