February 23 - February 25, 2020

9:00 a.m. to 5:15 p.m. daily

Louisiana Tech University

University Hall
Ruston, Louisiana 71270

Apply

Transportation | Hotel & Registration | Workshop Venue & CateringLaptop & Software | FAQs

What Is CREWE?

CREWE (Cyber Research for Empowering Women Experimenters) is an exciting new workshop, hosted by Louisiana Tech University and sponsored by Google, to introduce computing research to undergraduate women.  Attending this event will introduce attendees to the most interesting and innovative topics in computing today, including cyber security, internet of things, cloud computing, and more!  Research experiences at this workshop will make attendees stronger candidates for master’s and doctoral programs, leading them to pursue more challenging, fruitful careers.

Who Should Participate?

Although this workshop is intended for undergraduate women in computing disciplines, particularly juniors and seniors, it is open to anyone currently enrolled at a Louisiana university. Our aim is to boost interest in undergraduate research experiences at all levels.

Why Should I Participate?

Recent studies have shown an unfortunate gender gap in computing disciplines. This gap is more pronounced in emerging computing fields such as Cybersecurity.

Each accepted student will receive:

  • A hotel room (with a roommate) for the nights of February 23 – February 25,
  • Free lunch every day at the workshop,
  • Bus transit between the hotel and the workshop venue, and
  • A certificate of completion to celebrate your achievements.

How Do I Register?

If you’re considering becoming an innovator and participating in the CREWE workshop, please apply here by February 8, 2020.

Time

Who

Title

Sunday, February 23

11:30-12:45

Registration

1:00-2:15

Dr. Nashlie Sephus

Girl Techie, Boss Up!

2:15-3:30

Dr. Katie Evans

Challenges and Opportunities for Women in Cybersecurity

3:45-5:00

Piper Wilburn

Strengthen That Resume

Monday, Februray 24

9:00 – 10:30

Dr. Michelle Maasberg

Malicious Insider Threats – Cyber Sabotage

10:45 – 12:00

Dr. Lori Jacques

Challenge-Based Learning in CS Education

12:00-1:00

LUNCH

1:00-2:00

Anna White

Word Sleuths: Authorship Attribution with Natural Language Processing

2:00-3:30

Jennifer McCoy

Exploring Health Informatics

3:45-5:00

Drs. Nabamita Pal and Ben Drozdenko

Smarter & More Connected Cities and Communities using IoT and the Cloud

Tuesday, February 25

9:00-10:00

Vivya Kalidindi

Machine Learning with Beacon Technology

10:00-11:00

Dr. Vasanth Iyer

Enhancing Student Learning in Cyberanalytics using POGIL

11:00-12:00

Graduate Students Panel

The Graduate School Experience

12:00-12:15

You

Join a Research Team

12:15-1:00

LUNCH

1:00-3:45

You and Your Team

Prepare and Present a Research Idea

3:45-4:00

Dr. Beth Hegab

Applying to Graduate School

4:00-5:00

Dr. Nicole Beebe

Finding a Research Opportunity

 

%

Percentage of Cybersecurity Jobs that Require Graduate Degrees

%

Percentage of Growth in Computing and Mathematical Occupations

%

Percentage of Female Computer Programmers in the U.S.

%

Percentage of Cybersecurity Jobs Occupied by Women

Job Openings in Cybersecurity

Number of Additional Cybersecurity Professionals Needed by 2022