{"id":34306,"date":"2026-03-17T20:33:23","date_gmt":"2026-03-17T15:03:23","guid":{"rendered":"https:\/\/www.sbmjckgf.in\/wordpress\/?p=34306"},"modified":"2026-03-25T19:14:21","modified_gmt":"2026-03-25T13:44:21","slug":"department-of-computer-science-faculty-invited-as-a-resource-person","status":"publish","type":"post","link":"https:\/\/www.sbmjckgf.in\/wordpress\/2026\/03\/17\/department-of-computer-science-faculty-invited-as-a-resource-person\/","title":{"rendered":"Department of Computer Science faculty Invited as a Resource Person"},"content":{"rendered":"\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<p>The Department of Computer Science faculty <strong>Mr. Siddarama S Head Department of Computer Science, SBMJFGC-KGF<\/strong> Invited as a Resource Person<\/p>\n\n\n\n<p><strong>Institution Name : Nagarjuna College of Management and Science Chikkabalapura Karnataka.<\/strong><\/p>\n\n\n\n<p><strong>Date : 11th March 2026<\/strong><\/p>\n\n\n\n<p><strong>Title :Cyber Security in Artificial Intelligence and Internet of Things 4.0 <\/strong><\/p>\n<\/div>\n\n\n\n<p>Being invited as a resource person to speak on <em>Cyber Security in Artificial Intelligence and Internet of Things (IoT) 4.0<\/em> highlights the growing importance of securing modern digital ecosystems. As Artificial Intelligence and IoT technologies continue to transform industries through smart automation, real-time data processing, and interconnected devices, they also introduce significant cybersecurity challenges. With billions of devices connected globally, the attack surface has expanded, making systems vulnerable to threats such as data breaches, device hijacking, and AI-driven cyberattacks. Understanding this topic is essential not only to identify potential risks but also to explore advanced security solutions such as machine learning-based threat detection, encryption techniques, and zero-trust architectures. As a resource person, gaining deep insight into this domain enables the delivery of meaningful knowledge, bridging the gap between theory and real-world applications, and guiding students and professionals toward building secure, intelligent, and resilient technological systems for the future.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AI-based systems detect cyber threats using real-time data analysis<\/li>\n\n\n\n<li>Lightweight encryption secures low-power IoT devices<\/li>\n\n\n\n<li>Adversarial attacks can manipulate AI models<\/li>\n\n\n\n<li>Edge computing improves security by reducing cloud dependency<\/li>\n\n\n\n<li>Zero Trust model verifies every device and user continuously<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1280\" src=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/01-2.jpeg\" alt=\"\" class=\"wp-image-34307\" srcset=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/01-2.jpeg 1024w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/01-2-768x960.jpeg 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"1600\" src=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/11.jpeg\" alt=\"\" class=\"wp-image-34580\" srcset=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/11.jpeg 1200w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/11-768x1024.jpeg 768w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/11-1152x1536.jpeg 1152w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" src=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/22.jpeg\" alt=\"\" class=\"wp-image-34581\" srcset=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/22.jpeg 1600w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/22-768x576.jpeg 768w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/22-1536x1152.jpeg 1536w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/22-1200x900.jpeg 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" src=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/33.jpeg\" alt=\"\" class=\"wp-image-34582\" srcset=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/33.jpeg 1600w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/33-768x576.jpeg 768w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/33-1536x1152.jpeg 1536w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/33-1200x900.jpeg 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" src=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/44.jpeg\" alt=\"\" class=\"wp-image-34583\" srcset=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/44.jpeg 1600w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/44-768x576.jpeg 768w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/44-1536x1152.jpeg 1536w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/44-1200x900.jpeg 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" src=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/55.jpeg\" alt=\"\" class=\"wp-image-34584\" srcset=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/55.jpeg 1600w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/55-768x576.jpeg 768w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/55-1536x1152.jpeg 1536w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/55-1200x900.jpeg 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" src=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/66.jpeg\" alt=\"\" class=\"wp-image-34585\" srcset=\"https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/66.jpeg 1600w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/66-768x576.jpeg 768w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/66-1536x1152.jpeg 1536w, https:\/\/www.sbmjckgf.in\/wordpress\/wp-content\/uploads\/2026\/03\/66-1200x900.jpeg 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The Department of Computer Science faculty Mr. Siddarama S Head Department of Computer Science, SBMJFGC-KGF Invited as a Resource Person Institution Name : Nagarjuna College of Management and Science Chikkabalapura Karnataka. Date : 11th March 2026 Title :Cyber Security in Artificial Intelligence and Internet of Things 4.0 Being invited as a resource person to speak &hellip; <a href=\"https:\/\/www.sbmjckgf.in\/wordpress\/2026\/03\/17\/department-of-computer-science-faculty-invited-as-a-resource-person\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Department of Computer Science faculty Invited as a Resource Person&#8221;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-34306","post","type-post","status-publish","format-standard","hentry","category-dept-of-computer-science"],"_links":{"self":[{"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/posts\/34306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/comments?post=34306"}],"version-history":[{"count":3,"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/posts\/34306\/revisions"}],"predecessor-version":[{"id":34594,"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/posts\/34306\/revisions\/34594"}],"wp:attachment":[{"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/media?parent=34306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/categories?post=34306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sbmjckgf.in\/wordpress\/wp-json\/wp\/v2\/tags?post=34306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}