12 Songs for 12 Poets

“Twelve Songs for Twelve Poets,” an in-person workshop/performance with Dr. Anthony Geist and Spanish singer, musician and ethnomusicologist Paco Díez.

Changing the Conversation: Malini Gupta

Meet artist Malini Gupta whose book, The Fortune Teller, is included in the Collins Library exhibit Changing the Conversation. As the artist states, "through this work I seek to investigate the deeply entrenched gender biases that plague the Indian society. It is comprised of 2 parts: part one is the game of Fortune Teller; part two is my personal childhood story. The Fortune Teller -- an unassuming childhood game that predicts your future based on choices you make.

Nabil Ayers Lecture

Nabil Ayers, a UPS alum, is on a national book tour for his autobiography. He is an extremely successful music executive and rock drummer as well as the former owner of Sonic Boom Records in Seattle, Washington. In his book he reflects about his time at UPS, painting a very positive image of the school. This event is cosponsored by ASUPS and the BLP.

Understanding FERPA - Education Records and Your Role

If you handle student data in any capacity, then this presentation is for you! Whether you are a new faculty/staff member or could use a refresher on the topic, hear from Michael Pastore, Registrar, as he discusses the Family Educational Rights and Privacy Act (FERPA). You will learn about student rights under the regulation, gain clarity on the definition of education record, and be aware of your role in protecting student data. 

Please register here to receive the Zoom meeting information. 

Vex the Cybervillains

Stay ahead of the cybercriminals with 4 basic safe computing practices you can immediately put into practice. Learn what they are and why they are effective in protecting your accounts and personal information. 

Please register here to receive the Zoom meeting information.

Vex the Cybervillains

Stay ahead of the cybercriminals with 4 basic safe computing practices you can immediately put into practice. Learn what they are and why they are effective in protecting your accounts and personal information. 

Please register here to receive the Zoom meeting information.

Vex the Cybervillains

Stay ahead of the cybercriminals with 4 basic safe computing practices you can immediately put into practice. Learn what they are and why they are effective in protecting your accounts and personal information. 

Please register here to receive the Zoom meeting information.

Don’t Feed the Phish!

As they say, there are plenty of phish in the sea. Identifying common red flags in an email will help you quickly identify when you should proverbially swipe left. This session will help you understand how cybercriminals design convincing email messages intended to deceive you and why phishing is the most common cyberattack method. Gain confidence in spotting suspicious emails and learn how reporting protects yourself and the university. We will also cover what to expect with the new simulated phishing training initiatives. 

Don’t Feed the Phish!

As they say, there are plenty of phish in the sea. Identifying common red flags in an email will help you quickly identify when you should proverbially swipe left. This session will help you understand how cybercriminals design convincing email messages intended to deceive you and why phishing is the most common cyberattack method. Gain confidence in spotting suspicious emails and learn how reporting protects yourself and the university. We will also cover what to expect with the new simulated phishing training initiatives. 

Don’t Feed the Phish!

As they say, there are plenty of phish in the sea. Identifying common red flags in an email will help you quickly identify when you should proverbially swipe left. This session will help you understand how cybercriminals design convincing email messages intended to deceive you and why phishing is the most common cyberattack method. Gain confidence in spotting suspicious emails and learn how reporting protects yourself and the university. We will also cover what to expect with the new simulated phishing training initiatives.