Please review all events below for early registration as events are arranged by closest upcoming date!
Digital Forensics Special Interest Group (SIG)
Date/Time: Fall Semester 2015
Location: Cybercrime Training Lab 2, Second Floor of Dickinson Hall , Hackensack side of Metro Campus
Contact: Email email@example.com for any questions
This SIG meets on Monday evenings from 5:30 – 6:15 PM during the Fall Semester of 2015. The SIG is scheduled in the evening for the convenience of full or part time adult learner FDU students, but all FDU students, staff, and faculty are welcome. The SIG will help students learn about mobile device forensics. Equipment, tools, policy, and techniques will be demonstrated and/or discussed.
NOTE: There are no pre-requisites needed for this activity. There is also no cost and no credit given for attendance.
We will also be available for including FDU Vancouver by ITV (2:30 PM Pacific Time the same days)
Prof. Eamon P. Doherty Ph.D., SSCP, CPP, CCE
Week 1 – GPS Device Forensics : September 28
Week 2 – IPAD Forensics : October 5
Petrocelli Fall Recess – No School : October 12
Week 3 – Digital Camera Forensics : October 19
Week 4 – Pager Systems Forensics (3.5 million in use in USA, 2012) : October 26
Week 5 – CCTV Intro : November 2
Week 6 – Intro to Logic Cube : November 9
Week 7 – Legacy Media Forensics (CF Cards, Jazz Disks, Zip Disks, 3.5,5.25” and 8 Inch Diskettes, XD Cards) : November 16
Cell Phone Forensics Continuing Education
Date/Time: Tuesday - October 20, 2015 - 9am - 12pm
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Cost: The cost is $50 which also includes the $10 registration. It is best to register with a credit card to 201-692-6500 and a certificate will be mailed to you later.
Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP, CISSP
The course topics include either theory or practical training in:
Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the RCFL, The IACIS, I will demonstrate how to map the coordinates of a digital picture with embedded GPS Data
We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.
Clarifying Fog Networking
Date/Time: 12:30PM, Thursday, October 22, 2015, pre-meeting pizza starting at 12:15 PM.
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666, http://www.fdu.edu/visitorcenter/directions/teaneck_map.html.
Host: IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering
Contact: For more information contact: Hong Zhao (201)-692-2350, firstname.lastname@example.org; or Alfredo Tan, email@example.com.
About the Speaker
Dr. Mung Chiang is the Arthur LeGrand Doty Professor of Electrical Engineering at Princeton University and the recipient of the 2013 Alan T. Waterman Award. He created the Princeton EDGE Lab in 2009 to bridge the theory-practice divide in networking by spanning from proofs to prototypes, resulting in a few technology transfers to industry, several startup companies and the 2012 IEEE Kiyo Tomiyasu Award. He serves as the inaugural Chairman of Princeton Entrepreneurship Council and the Director of Keller Center for Innovation in Engineering Education at Princeton. His Massive Open Online Courses on networking reached over 250,000 students since 2012 and the textbook received the 2013 Terman Award from American Society of Engineering Education. He was named a Guggenheim Fellow in 2014.
About the Talk
Pushing computation, control and storage into the “cloud” has been a key trend in networking in the past decade. The cloud is now “descending” to the network edge and often diffused among the client devices. The cloud is becoming the “fog.” Fog Network presents an architecture that uses one or a collaborative multitude of end-user clients or near-user edge devices to carry out storage, communication, computation, and control in a network. This talk will survey such an architecture that will support the Internet of Things, heterogeneous 5G mobile services, and home and personal area networks, and explore how fog networks may incorporate the latest advances in devices, network systems, and data science to reshape the “balance of power” in the ecosystem of computing and networking.
All are welcome!
You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 12:15 P.M.
National Cybersecurity Symposium: Bulding Law Enforcement and Financial Services Sector Partnerships
Date/Time: Thursday, October 22, 2015 from 8:30am - 12:00pm (registration will be available from 8:00am - 8:30am)
Location: Kean University’s STEM Building (1075 Morris Avenue, Union, NJ 07083). The STEM Building is located right next to URSINO Restaurant.
Register: Space for this event is limited, so please register early. Organizations will be treated on a first come, first served basis. Individual slots per organization may be limited to allow for the largest number of organizations to participate. A request for registration does not guarantee participation.
If you wish to attend this event, please RSVP to Theresa Kwon (Theresa.Kwon@ic.fbi.gov) and provide the following information by Thursday, October 15th, 2015.
- Email Address
- Office Phone
- Mobile Phone
This event is an open house hosted by FBI, U.S. Secret Service (USSS), and the Department of the Treasury and sponsored by the Financial Services Sector Coordinating Council (FSSCC), the financial services sector’s coordinator for the protection of critical financial infrastructure.
The purpose of this event is to enhance collaboration between financial services sector institutions and federal law enforcement entities on cybersecurity. Session attendees will gain further insight into the capabilities within both the FBI and USSS, a better understanding of cybersecurity threats, and information about how to incorporate collaboration with law enforcement into internal incident response plans. Collaborating with law enforcement in the event of an incident, as well as contacting the relevant financial regulatory agencies, can enhance an institution's ability to contain, mitigate, and recover from cyber incidents.
IEEE Xtreme Programming Competition
Date/Time: Competition on October 24, 2015; Registration will close on October 12, 2015 00:00:00 UTC.
Location: No travel required, just brain power, stamina and your favorite energy drink.
Register: Register your team now.
Contact: Students at FDU should compete through the IEEE student club, reach out to Dr. Mondal firstname.lastname@example.org
What could you win?
- Fame: Competing in the world's most 'Xtreme' programming contest is a big deal participating means you get unlimited bragging rights.
- Grand prize is a trip to the IEEE conference of your choice, anywhere in the world.
- Second place team members each receive an iPad Air®.
- Third place team members each receive an iPad mini®.
- Fourth - Tenth place team members each receive a Raspberry Pi computer.
- Top 100 place team members will receive an Xtreme merchandise bundle and special software gifts from competition partners.
- Opportunity: Past IEEEXtreme winners have had great success in leveraging their competition performance in their career growth.
Visit the IEEEXtreme website for complete contest rules and prize information.
2015 National CyberWatch Center Webinars
Date/Time: All webinars are 30 minutes (except the one on Feb. 27th) and will begin at 11 a.m. ET.
Host: National CyberWatch Center
Register: Register here!
Contact: For questions regarding trainings, contact Lynn Dohm at email@example.com.
Google Hangout Invitations will be sent to the email address you provide the day before the webinar. All webinars are 30 minutes (except the one on Feb. 27th) and will begin at 11 a.m. ET.
Don't delay, seats are limited!
The webinars are as follows:
Cyber Security Education Consortium (CSEC) Resources : February 27, 2015
Making Sense of Virtualization Degrees/Certificates/Certifications for Colleges/Universities : March 27, 2015
National Cyber League for the Classroom : April 24, 2015
National Centers of Academic Excellence in Information Assurance/Cyber Defense (CAE): Program Updates and Support : May 29, 2015
Q&A with Representatives from the Advanced Cyberforensics Education (ACE) Consortium : August 28, 2015
Q&A with Representatives from CyberWatch West : September 25, 2015
Content is King: National CyberWatch Center Curriculum Updates & What it Means for Your Institution : October 30, 2015
Stop.Think.Connect Program : November 20, 2015
CISSE Spring 2016 Call For Papers
Date/Time: No later than December 30, 2015
Please submit your Academic Paper to askCISSE@cisse.info following the CISSE Publication Policies that can be found at: www.cisse.info/resources
Cost: Early Bird Registration opens January 1, 2016
Back by popular demand a “Special Edition” of the CISSE Journal, which will be offered in both digital and paperback versions on Amazon.com this Spring.
The publication Title: Special Edition of the Colloquium for Information Systems Education: Innovative Classroom Approaches for Cyber Security Education, Edition 3, Issue 2
Special consideration will be given to papers earlier submitted but re-directed to our "Round Table" sessions in June.
Your submission will be double blind reviewed and our editorial staff will contact you if we are considering publishing your paper for the Special Edition by January 30, 2015. Submissions must be in "Word" and must be anonymized to allow for double-blind reviewing. Authors are expected to make a good faith effort to anonymize their submissions and should not identify themselves either explicitly or by implication (e.g., through references or acknowledgments). Submissions violating formatting or anonymization instructions will be returned without review.
Papers on original unpublished results may be at most 10 pages in length (single-column, single-spacing, at least 11 point font, with reasonable margins, including figures, tables, and references). Accepted papers will be published in the Spring Special Edition and it will require the authors to work with the Editorial staff to make any necessary changes and to be formatted as a word document for a 6 x 9 inch page with .5 inch margins. All digitized images submitted with the final revision of the manuscript must be of high quality and have resolutions of at least 300 d.p.i. for color, 600 d.p.i. for greyscale and 1,200 d.p.i. for line art.
CISSE will continue to have Academic Paper presentation sessions in Philadelphia, and publish those papers in Edition 4, Issue 1 in the fall of 2016. Stay tuned for that announcement later this year.
Singapore Cybersecurity R&D Conference: Call for Abstracts
Date/Time: January 14-15, 2016
Location: Location: Singapore University of Technology and Design, Singapore
Register: Details of submission can be found in the Conference website: http://itrust.sutd.edu.sg/sg-crc-2016/
This is not an opportunity to be missed! Submit a technical paper in the research, industry, or tools track. Engage in conversations with the top researchers and practitioners from across the world in the area of cyber security. Visit the most advanced realistic testbeds in cyber physical systems and enjoy a game of attack and defence. And of course, enjoy the ever beautiful Singapore.
Students are strongly encouraged to participate and compete for many cash prizes.
Theme: Cyber Security by Design
The inaugural Singapore Cyber Security R&D Conference will be held in Singapore on January 14-15, 2016 at the campus of the Singapore University of Technology and Design (SUTD). The conference will bring together academics and practitioners from across the world to participate in a vibrant programme consisting of research papers, industrial best practices, and tools exhibition. Students, undergraduate and graduate, are encouraged to participate in specially organised sessions. Several cash awards and certificates will be given to the best contributions in various student categories.
This year’s theme focuses on the importance of bringing a technically grounded element of design that integrates cyber security into a system early in the process rather than an afterthought. The element of design is integral to a process be it a purely software system, such as one engaged in managing online transactions, or a combination of hardware and software, such as in Industrial Control Systems, pacemakers, and a multitude of IoT devices. This design element pervades the entire development process from the beginning till the end, and even during operation and maintenance. SG-CRC 2016 will focus on how design as an element can be made explicit early in the development process using novel techniques based on sound mathematical tools and engineering approaches.
Authors are invited to submit original work on any of the topics listed below. Submissions that fall in the general area of cyber security but not exactly in any of the topics below will also be considered. Submissions may focus on theoretical results, experiments, or a mix of both.
- Attacker and attack models
- Cyber Security Education
- Data privacy
- Defence against side channel attacks
- Design of runtime security
- Design of secure controllers
- Design of secure systems from insecure components
- Digital Forensics
- Economic models of cyber security
- EV/AV security
- Formal methods in cyber security
- Hardware/software cyber defense mechanisms
- IoT security
- Legal aspects of cyber security
- Lightweight crypto and security
- Methodologies for assessing system security and risk
- Mobile security
- Protection of public infrastructure: power, water, and transportation
- Security by design
- Security in healthcare
- Security policies and compliance
- Social Engineering and cyber security
- Testbeds for experimentation
- Testing for cyber security
- Urban transportation system security
- Verified security design