In the press


      

 

September 14, 2017: Madnick and Research Affiliate Michael Coden quoted in InfoSecurity Magazine-  The Battle for Cybersecurity Talent in America: East Coast vs. West Coast

September 11, 2017: Madnick addresses Healthcare Security Forum (HICSS)- Equifax hack: What cybersecurity pros are saying about the breach

September 5, 2017: Greg Falco ((IC)3 Researcher) featured on MIT's Home page- Gregory Falco: Protecting urban infrastructure against cyberterrorism

August 16, 2017: Madnick quoted in LifeHacker article - "We asked Five Security Experts if Smart Locks are Ever Safe"

August 3, 2017: Madnick's Webinar at Harvard Business Review - "Cybersecurity for the C-Suite" 

July 31, 2017: Jaiali Column at The Conversation - "How to Boil Down a Pile of DIverse Research Papers into One Cohesive Picture"

July 13, 2017: (IC)3 research, Professors Stuart Madnick and Nazli Chouri, Research Affiliate Jerry Grochow and other (IC)3 team members featured in Sloan Magazine - Battling Cybercrime: MIT Tackles a Global Challenge

May 2017: Siegel quoted in TechTarget - "Not Investing in Cybersecurity has 'Inverse ROI"

May 2017: Pearlson quoted in MIT Sloan News – “How to Survive a Hack: Management Trumps Technology”

May 10, 2017: Madnick’s Column at Harvard Business Review – "Preparing for the Cyberattack That Will Knock Out U.S. Power Grids."

May 8, 2017: Madnick article in Forbes.com – “Security Surprises Arising from the Internet of Things (IoT) 

May 8, 2017:  Madnick quoted in USA Today – “Wanted: Cybercrime Fighters” 

Winter 2017: Madnick interview in Sloan Alumni magazine article about (IC)3 work : "Taking a Management Approach to Fighting Cybercrime"

April 24, 2017: Sloan and Madnick in Financial Times China: 应对黑客攻击从MBA抓起 English translation here "MBAs vs hackers: leaders of the future learn to fight cyber crime"

April 6, 2017: Financial Times "MBAs vs hackers: leaders of the future learn to fight cyber crime"

March 15, 2017: (IC)3 on Panel: "The Internet of Things – Attack Vulnerabilities and Solutions" at Financial Times Cyber Security Summit in Washington, DC see video 

Jan 2017: Madnick Interview in Sloan Management Review"What Executives Get Wrong About Cybersecurity"

Nov 2016: Madnick Blog for MIT Sloan: "Security and the Internet of Things"

Oct 5, 2016: Madnick Op Ed in The Conversation"Should NSA and Cyber Command have separate leadership?"

Oct 3, 2016: Madnick interview in Poets & Quants"At Cybersecurity Summit, Warnings For Biz, And All"

Sept 2016: Madnick interview for CNBC"The real and growing threat of cyber crime to corporations"

April 30, 2016: Madnick Interview in Tech Target: "Security of IoT-enabled devices remains low priority for developers"

April 30, 2016: Madnick Interview in Tech Target: "Dark Web: hackers trump good guys in sharing information"

April 30, 2016: Madnick Interview in Tech Target: "MIT Sloan research: CISOs enter the boardroom" 

April 20, 2016:  Videos: Professor Madnick and Dr. Jalali talk at the MIT Information and Communication Technologies Conference. Watch videos here and here.

March 5, 2016: Video: Michael Siegel talks about cybersecurity at the 20th Annual ARC Industry Forum: Industry in Transition. Watch video 

July 27, 2015: CRN Interview of (IC)3 Director Stuart Madnick, and video of Professor Madnick's presentation on "Why CDOs Should Be In Charge of Cybersecurity" at the MIT Chief Data Officer & Information Quality Symposium, July 23 & 23, 2015. 

June 29, 2015: Tech Target writes about (IC)3 and interviews Director Stuart Madnick: "New tactics for improving critical infrastructure cybersecurity pushed by MIT consortium"

June 28, 2015: Writes about (IC)3 and interviews Director Stuart Madnick: 
"Innovative Masdar Institute and MIT research targets UAE cyber infrastructure security challenges"

June 25, 2015: CIO Magazine
"Solving the unstructured data challenge" - quotes (IC)3's Stuart Madnick
Video Interview 1
Video Interview 2

June 2, 2015: International Conference on Computer Security in a Nuclear World: Expert Discussion and Exchange, June 1-5, Vienna, Austria - (IC)3 invited to present:
Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cybersecurity Applied to TJX Case - presented by Michael Coden

May 20, 2015: MIT CIO Symposium
Cybersecurity New Approaches Assessing and Maximizing Your Protection
Presentation and Panel Moderator - (IC)3 Director Stuart Madnick
View Video of Professor Madnick's presentation and the panel

April 21, 2015: The Wolves of Vuln Street: The 1st System Dynamics Model of the 0day Market - presented by (IC)3 Associate Director Michael Siegel, and Katie Moussouris of HackerOne 

March 18, 2015: Bloomberg Advantage Click here to hear the interviews

March 12, 2015: (IC)3 Launched at the "Cybersecurity at MIT" Event

March 11, 2015: (IC)3 Featured in the Wall Street Journal - to View the Article Click Here

March 4, 2015: features (IC)3 and (IC)3 Director Stuart Madnick in article about MIT's new Cybersecurity Programs - to View the Article Click Here

February 12, 2015: (IC)3 presents four papers and two industry panels at the ARC Industry Forum

February 11, 2015: (IC)3 Associate Director Michael Siegel appears on the President's Executive Plenary panel at the ARC Industry Forum

December 22, 2014:   Read (IC)3 Director, Professor Stuart Madnick, in the Boston Globe, commenting on the SONY breach:
http://www.bostonglobe.com/business/2014/12/22/cyber-warning-shot-from-north-korea/L1sf3OuMPdaSe449Yt67dP/story.html 

November 18, 2014: Read about the Hewlett Foundation grant of $15 million to MIT for Cybersecurity Research:
http://www.hewlett.org/newsroom/press-release/hewlett-foundation-announces-45-million-grants-mit-stanford-uc-berkeley-establish-major-new-academic

March 17, 2014: Read (IC)3 Director Professor Stuart Madnick in MarketWatch.com about Target and other breaches:
http://www.marketwatch.com.ezproxy.canberra.edu.au/story/after-target-data-theft-hackers-next-target-is-you-2014-03-17

February 12, 2013: White House Executive Order 13636:
“… cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront ...”