The Cybersecurity for Seniors event is scheduled for February 4, 2025. Stay tuned for more details.
Feel free to reach out if you need any additional information.
Telephone: 954.262.4613 -or- 954.262.5477 eMail: refdesk@nova.edu -or- pcsrefdesk@nova.edu
10:00am - 10:30am Welcome + Library Speakers
10:30am - 11:00am Community Partners
11:00am - 12:00pm Ling Wang, Ph.D., Professor
NSU College of Computing and Engineering
12:00pm - 1:00pm Lunch
1:00pm - 2:00pm Peter Warmka, author of Why are you messing with Me? Senior Survival Guide on fraud, privacy, and security
2:00pm - 3:00pm Book signing - Peter Warmka
The event will be held in the Alvin Sherman Library, Research, and Information Technology Center - Adolfo and Marisela Cotilla Gallery
Parking on the first floor of the garage is free.
Dr. Ling Wang, Professor, NSU College of Computing and Engineering
Dr. Wang joined NSU in 2003, after receiving her Ph.D. in educational technology and a statistical consulting certificate from Purdue University. She teaches graduate courses in Information Systems, Information Assurance, and Cybersecurity Management. Dr. Wang is an active member of several professional associations, including AERA, AIS, and IEEE, and presents at the conferences associated with and sponsored by these associations. She has authored various journal articles and conference presentations in the areas of learning systems – integration and evaluation, information privacy paradox, and security and ethical issues in online computing communities.
Peter Warmka
Peter Warmka is a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) collection.
With 20+ years of breaching security overseas for a living, Warmka is now dedicated to educating businesses and individuals about human hacking and AI threats.
Mr. Warmka is the author of another book titled, Confessions of a CIA spy: The art of human hacking. In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they’re high-profile individuals or entire organizations.