Events

Office of the University Provost
Center for Cybersecurity & Information Assurance

Please review all events below for early registration as events are arranged by closest upcoming date!


Codebreaker Challenge 3.0

Date/Time: September 1, 2015 at Midnight until December 31, 2015
Register: Register with your student email at https://codebreaker.ltsnet.net/

The NSA plans to launch the 3rd annual Codebreaker Challenge this Fall in a competition to see which university can be the first to solve the challenge, and which can have the most solutions submitted. This will provide your students with an excellent hands-on opportunity to develop their reverse-engineering / low-level code analysis skills while working on a realistic problem set. Feedback from previous competitions indicated that students got a lot out of it, so with your help we would like to encourage as much participation as possible! Here are the pertinent details:

  • The challenge materials and instructions will be hosted at https://codebreaker.ltsnet.net/.
  • The challenge will begin on Sept. 1st at midnight, and will end on Dec. 31st.
  • Prizes will be awarded to the first 50 students that complete the challenge nation-wide. In the past, some universities have also chosen to offer additional incentives (extra-credit in a course, an award for the first students to solve the challenge within a department, etc.). We encourage you to do this as well if possible.
  • Students should register for the site using their .edu email addresses.
  • Links to reverse engineering lectures and other learning materials can be found on the site.

A virtual tech talk has been scheduled for September 17th from 2:00 to 3:00 PM EST in which we will introduce the challenge, present some reverse engineering techniques, and walk through the solution to the challenge from last year. We can also answer questions that students may have about the challenge at that time. More details regarding how to connect in to this event will be sent out through the CAE Tech Talk email distribution list in the coming weeks.


 

2015 Train-the-Trainer Workshops

National CyberWatch Center and the National Resource Center for Systems Security and Information Assurance are pleased to announce the spring/summer training schedule.

CISSP, Netlabs User Community Workshop, SCADA and many more!

CLICK HERE to CHECK out the OFFERINGS!

Don't delay, seats are limited!

For questions regarding trainings, contact Lynn Dohm at ldohm@nationalcyberwatch.org.

Cyber Quests Webinar Distance Learning, Various Cities: April 07, 2015

(ISC)²® CISSP® Course Distance Learning, Various Cities: June 01, 2015

ISACA Cybersecurity Fundamentals Certificate Distance Learning, Various Cities: June 08, 2015

The Art of Penetration Testing - Teaching Ethical Hacking College of Southern Nevada, North Las Vegas, NV: June 17, 2015

The Internet of Things ~ Network Security is Everything! College of Southern Nevada, North Las Vegas, NV: June 17, 2015

Using Cybersecurity Related Websites in the Classroom College of Southern Nevada, North Las Vegas, NV: June 17, 2015

Netlabs+ User Community Workshop Distance Learning, Various Cities: June 25, 2015

CSSIA 2015 Version of Security+ Distance Learning, Various Cities: July 20, 2015

SCADA Distance Learning, Various Cities: August 03, 2015

Netlabs+ User Community Workshop Distance Learning, Various Cities: August 06, 2015

(ISC)²® CISSP® Course Distance Learning, Various Cities: August 10, 2015

(ISC)²® SSCP® Course Distance Learning, Various Cities: September 07, 2015


 

NICE 2015 Call for Proposals

Date/Time: Proposals will be accepted through September 9, 2015
Location: Paradise Point Conference Center, San Diego, California
Register: To read more and SUBMIT your IDEAS, click here.

 

Event organizer NICE365 has opened up its Call for Proposals for NICE 2015, the 6th Annual National Initiative for Cybersecurity Education Conference, taking place in San Diego, California on November 3-4, 2015.

NICE fosters and promotes an ecosystem of cybersecurity education, training, and workforce development that effectively secures cyberspace. The NICE 2015 Conference is a rallying point around cybersecurity education and workforce development providing a face-to-face convening of public-private partners, an opportunity to signal NICE strategic directions and priorities, and a forum to showcase best practices.

The NICE 2015 Program Committee seeks your participation as a presenter or panelist for one of the 45-minute sessions in this powerful three-track conference. NICE 2015 offers unparalleled opportunities to demonstrate how your programs, ideas, technologies and processes support the continuing development of tomorrow's cybersecurity leaders. Today's efforts will drive business and job growth, provide opportunity, as well as provide enhanced security for our nation. Share your knowledge and experience by submitting a proposal.

Participants from academia, industry, and government (Federal, State, local, and tribal) are encouraged to address the following strategic cybersecurity education and workforce topics:

Track 1: Accelerate Learning and Skills Development

Track 2: Establish a Diverse Learning Community

Track 3: Workforce Development and Career Planning

For more information about NICE 2015, click here.


 

2015 National CyberWatch Center Webinars

Google Hangout Invitations will be sent to the email address you provide the day before the webinar. All webinars are 30 minutes (except the one on Feb. 27th) and will begin at 11 a.m. ET.

Register here!

Don't delay, seats are limited!

For questions regarding trainings, contact Lynn Dohm at ldohm@nationalcyberwatch.org.

The webinars are as follows:

Cyber Security Education Consortium (CSEC) Resources: February 27, 2015

Making Sense of Virtualization Degrees/Certificates/Certifications for Colleges/Universities: March 27, 2015

National Cyber League for the Classroom: April 24, 2015

National Centers of Academic Excellence in Information Assurance/Cyber Defense (CAE): Program Updates and Support: May 29, 2015

Q&A with Representatives from the Advanced Cyberforensics Education (ACE) Consortium: August 28, 2015

Q&A with Representatives from CyberWatch West: September 25, 2015

Content is King: National CyberWatch Center Curriculum Updates & What it Means for Your Institution: October 30, 2015

Stop.Think.Connect Program: November 20, 2015


 

IEEE Xtreme Programming Competition

Date/Time: Competition on October 24, 2015; Registration will close on October 12, 2015 00:00:00 UTC.
Location: No travel required, just brain power, stamina and your favorite energy drink.
Register: Register your team now.
Contact: Students at FDU should compete through the IEEE student branch, reach out to Dr. Mondal <mondal@fdu.edu>

What could you win?

  • Fame: Competing in the world's most 'Xtreme' programming contest is a big deal participating means you get unlimited bragging rights.
  • Fortune:
    • Grand prize is a trip to the IEEE conference of your choice, anywhere in the world.
    • Second place team members each receive an iPad Air®.
    • Third place team members each receive an iPad mini®.
    • Fourth - Tenth place team members each receive a Raspberry Pi computer.
    • Top 100 place team members will receive an Xtreme merchandise bundle and special software gifts from competition partners.
  • Opportunity: Past IEEEXtreme winners have had great success in leveraging their competition performance in their career growth.

Visit the IEEEXtreme website for complete contest rules and prize information.


 

Singapore Cybersecurity R&D Conference: Call for Abstracts

Date/Time: January 14-15, 2016
Location: Singapore University of Technology and Design, Singapore
Register: Details of submission can be found in the Conference website:http://itrust.sutd.edu.sg/sg-crc-2016/

This is not an opportunity to be missed! Submit a technical paper in the research, industry, or tools track. Engage in conversations with the top researchers and practitioners from across the world in the area of cyber security. Visit the most advanced realistic testbeds in cyber physical systems and enjoy a game of attack and defence. And of course, enjoy the ever beautiful Singapore.

Students are strongly encouraged to participate and compete for many cash prizes.

Theme: Cyber Security by Design

The inaugural Singapore Cyber Security R&D Conference will be held in Singapore on January 14-15, 2016 at the campus of the Singapore University of Technology and Design (SUTD). The conference will bring together academics and practitioners from across the world to participate in a vibrant programme consisting of research papers, industrial best practices, and tools exhibition. Students, undergraduate and graduate, are encouraged to participate in specially organised sessions. Several cash awards and certificates will be given to the best contributions in various student categories.

This year’s theme focuses on the importance of bringing a technically grounded element of design that integrates cyber security into a system early in the process rather than an afterthought.  The element of design is integral to a process be it a purely software system, such as one engaged in managing online transactions, or a combination of hardware and software, such as in Industrial Control Systems, pacemakers, and a multitude of IoT devices. This design element pervades the entire development process from the beginning till the end, and even during operation and maintenance. SG-CRC 2016 will focus on how design as an element can be made explicit early in the development process using novel techniques based on sound mathematical tools and engineering approaches.

Submissions

Authors are invited to submit original work on any of the topics listed below. Submissions that fall in the general area of cyber security but not exactly in any of the topics below will also be considered. Submissions may focus on theoretical results, experiments, or a mix of both.

  • Attacker and attack models
  • Biometrics
  • Cyber Security Education
  • Data privacy
  • Defence against side channel attacks
  • Design of runtime security
  • Design of secure controllers
  • Design of secure systems from insecure components
  • Digital Forensics
  • Economic models of cyber security
  • EV/AV security
  • Formal methods in cyber security
  • Hardware/software cyber defense mechanisms
  • IoT security
  • Legal aspects of cyber security
  • Lightweight crypto and security
  • Methodologies for assessing system security and risk
  • Mobile security
  • Protection of public infrastructure: power, water, and transportation
  • Security by design
  • Security in healthcare
  • Security policies and compliance
  • Social Engineering and cyber security
  • Testbeds for experimentation
  • Testing for cyber security
  • Urban transportation system security
  • Verified security design