Past Events

Digital Forensics Special Interest Group Spring 2016

Date/Time: Meets Tuesday 5:30 PM – 6:15 PM Starting Tuesday January 12, 2016
Location: Cybercrime Lab 2, Dickinson Hall, Metropolitan Campus
Contact: For more information, email Dr. Eamon Doherty.

It is free and there are no prerequisites to attend. It is open to faculty, staff, and students at all campuses of FDU.

Week 1: January 12, 2016
We will discuss some places where digital evidence is kept. Then we will learn to examine a digital picture frame and recover some pictures that were deleted from it.

Week 2: January 19, 2016
We do not meet.

Week 3: January 26, 2016
We will discuss the need for investigators to be able to seize webmail and keep the integrity of the folders. Then we will look at a tool for seizing webmail.

Week 4: February 2, 2016
We will learn to forensically wipe a hard drive with a Logic Cube and discuss why hard drives need to be wiped.

Week 5: February 9, 2016
We will learn to forensically copy a hard drive with a Logic Cube and discuss why it is necessary.

Week 6: February 16, 2016
We will learn to forensically examine a piece of legacy digital media and discuss why it is still necessary.

Week 7: February 23, 2016
We will learn to forensically examine a cell phone and collect the evidence with a popular cell phone forensic tool.


Singapore Cybersecurity R&D Conference: Call for Abstracts

Date/Time: January 14-15, 2016
Location: Location: Singapore University of Technology and Design, Singapore
Register: Details of submission can be found in the Conference website: http://itrust.sutd.edu.sg/sg-crc-2016/

This is not an opportunity to be missed! Submit a technical paper in the research, industry, or tools track. Engage in conversations with the top researchers and practitioners from across the world in the area of cyber security. Visit the most advanced realistic testbeds in cyber physical systems and enjoy a game of attack and defence. And of course, enjoy the ever beautiful Singapore.

Students are strongly encouraged to participate and compete for many cash prizes.

Theme: Cyber Security by Design

The inaugural Singapore Cyber Security R&D Conference will be held in Singapore on January 14-15, 2016 at the campus of the Singapore University of Technology and Design (SUTD). The conference will bring together academics and practitioners from across the world to participate in a vibrant programme consisting of research papers, industrial best practices, and tools exhibition. Students, undergraduate and graduate, are encouraged to participate in specially organised sessions. Several cash awards and certificates will be given to the best contributions in various student categories.

This year’s theme focuses on the importance of bringing a technically grounded element of design that integrates cyber security into a system early in the process rather than an afterthought. The element of design is integral to a process be it a purely software system, such as one engaged in managing online transactions, or a combination of hardware and software, such as in Industrial Control Systems, pacemakers, and a multitude of IoT devices. This design element pervades the entire development process from the beginning till the end, and even during operation and maintenance. SG-CRC 2016 will focus on how design as an element can be made explicit early in the development process using novel techniques based on sound mathematical tools and engineering approaches.

Submissions

Authors are invited to submit original work on any of the topics listed below. Submissions that fall in the general area of cyber security but not exactly in any of the topics below will also be considered. Submissions may focus on theoretical results, experiments, or a mix of both.

  • Attacker and attack models
  • Biometrics
  • Cyber Security Education
  • Data privacy
  • Defence against side channel attacks
  • Design of runtime security
  • Design of secure controllers
  • Design of secure systems from insecure components
  • Digital Forensics
  • Economic models of cyber security
  • EV/AV security
  • Formal methods in cyber security
  • Hardware/software cyber defense mechanisms
  • IoT security
  • Legal aspects of cyber security
  • Lightweight crypto and security
  • Methodologies for assessing system security and risk
  • Mobile security
  • Protection of public infrastructure: power, water, and transportation
  • Security by design
  • Security in healthcare
  • Security policies and compliance
  • Social Engineering and cyber security
  • Testbeds for experimentation
  • Testing for cyber security
  • Urban transportation system security
  • Verified security design

The Black T-Shirt Forensics Challenge

Date/Time: January 1, 2016 to April 1, 2016
Register: Registration for the annual challenge will be available on January 1, 2016.

The Black T-Shirt Cyber Forensics Challenge is a free, annual contest, which has been designed to address a variety of elements important in conducting today's digital forensics examinations, incident responses, and intrusion analyses. This Challenge includes elements such as:

  • File system and operating system identification
  • Recovery of operating system and application artifacts
  • Recovery of user-created artifacts
  • Conducting in-depth analysis across the system and scenario, which extends beyond artifact recovery
  • Event reconstruction
  • Report writing

Each Challenge, designed by one or more of the Challenge's partners, will require participants to perform various activities of varying degrees of difficulty ranging from novice to expert.

In addition to the annual challenge, mini challenges will be offered starting in the fall.

For more information click here.


2015 National Initiative for Cybersecurity Education (NICE) Conference

Date/Time: November 3-4, 2015
Location: Paradise Point Resort & Spa1404 Vacation Road, San Diego, CA 92109, United States
Register: Register Now

NICE fosters and promotes an ecosystem of cybersecurity education, training, and workforce development that effectively secures cyberspace. The NICE 2015 Conference is a rallying point around cybersecurity education and workforce development providing a face-to-face convening of public-private partners, an opportunity to signal NICE strategic directions and priorities, and a forum to showcase best practices. Cybersecurity has emerged as one of the leading creators of jobs and opportunity for all economic sectors. The demand for cybersecurity positions in both the public and private sector is large and growing, but the talent pool of cybersecurity workers is not yet able to keep up.


Digital Forensics Special Interest Group (SIG)

Date/Time: Fall Semester 2015
Location: Cybercrime Training Lab 2, Second Floor of Dickinson Hall , Hackensack side of Metro Campus
Contact: Email doherty@fdu.edu for any questions

This SIG meets on Monday evenings from 5:30 – 6:15 PM during the Fall Semester of 2015. The SIG is scheduled in the evening for the convenience of full or part time adult learner FDU students, but all FDU students, staff, and faculty are welcome. The SIG will help students learn about mobile device forensics. Equipment, tools, policy, and techniques will be demonstrated and/or discussed.

NOTE: There are no pre-requisites needed for this activity. There is also no cost and no credit given for attendance.

We will also be available for including FDU Vancouver by ITV (2:30 PM Pacific Time the same days)

Prof. Eamon P. Doherty Ph.D., SSCP, CPP, CCE

Week 1 – GPS Device Forensics: September 28

Week 2 – IPAD Forensics: October 5

Petrocelli Fall Recess – No School: October 12

Week 3 – Digital Camera Forensics: October 19

Week 4 – Pager Systems Forensics (3.5 million in use in USA, 2012): October 26

Week 5 – CCTV Intro: November 2

Week 6 – Intro to Logic Cube: November 9

Week 7 – Legacy Media Forensics (CF Cards, Jazz Disks, Zip Disks, 3.5,5.25” and 8 Inch Diskettes, XD Cards): November 16


CISSE Spring 2016 Call For Papers

Date/Time: No later than December 30, 2015
Location: Philadelphia
Host: CISSE
Register:
Please submit your Academic Paper to askCISSE@cisse.info following the CISSE Publication Policies that can be found at: www.cisse.info/resources
Cost: Early Bird Registration opens January 1, 2016

Back by popular demand a “Special Edition” of the CISSE Journal, which will be offered in both digital and paperback versions on Amazon.com this Spring.

The publication Title: Special Edition of the Colloquium for Information Systems Education: Innovative Classroom Approaches for Cyber Security Education, Edition 3, Issue 2

Special consideration will be given to papers earlier submitted but re-directed to our "Round Table" sessions in June.

Your submission will be double blind reviewed and our editorial staff will contact you if we are considering publishing your paper for the Special Edition by January 30, 2015. Submissions must be in "Word" and must be anonymized to allow for double-blind reviewing. Authors are expected to make a good faith effort to anonymize their submissions and should not identify themselves either explicitly or by implication (e.g., through references or acknowledgments). Submissions violating formatting or anonymization instructions will be returned without review.

Papers on original unpublished results may be at most 10 pages in length (single-column, single-spacing, at least 11 point font, with reasonable margins, including figures, tables, and references). Accepted papers will be published in the Spring Special Edition and it will require the authors to work with the Editorial staff to make any necessary changes and to be formatted as a word document for a 6 x 9 inch page with .5 inch margins. All digitized images submitted with the final revision of the manuscript must be of high quality and have resolutions of at least 300 d.p.i. for color, 600 d.p.i. for greyscale and 1,200 d.p.i. for line art.

CISSE will continue to have Academic Paper presentation sessions in Philadelphia, and publish those papers in Edition 4, Issue 1 in the fall of 2016. Stay tuned for that announcement later this year.


Cybersecurity Hard Problems Workshop III

Date/Time: June 30 - July 1
Location: Griffiss Institute Rome, NY
Host: Cyber Research Institute
Register: If you would like to attend, register for the workshop via http://www.cyberri.org.
Contact: Contact Kathaleene Riolo at kriolo@cyberri.org with any questions.

The Cyber Research Institute (CRI) is sponsoring its third workshop on cybersecurity: Cybersecurity Hard Problems Workshop III. The purpose of this workshop is to exchange cybersecurity ideas across domains. Specifically, Workshop III, will address hard problems related to technology transition. Similar to the first two workshops, Workshop III will address priority problems for the State and Nation, however, the focus will not be on identifying priority research topics, but to address the question, “What are we going to DO about it?” The workshop will be hosted at the Griffiss Institute in Rome, NY. There is no fee for the workshop. The purpose of this workshop is to bring together distinguished researchers and domain experts for a three-day period to examine, discuss, and propose solutions to the most pressing issues in cybersecurity today. The workshop is sponsored by the Cyber Research Institute in cooperation with the Griffiss Institute, the Air Force Research Laboratory Information Institute, InfraGard, and CYBER NY Alliance.

At the two-day summer workshop, we envision Day 1 being a set of presentations by application domain specialists and SME’s from a variety of sectors (financial, healthcare, power, transportation, etc...). Also, Day 1 will feature a short breakout session to discuss solutions to hard problems and technology transition issues. At the end of Day 1, we will have short social hour and networking event. This should be a good venue for exchanging information and ideas. Day 2 will continue SME presentations.

We hope that you can join us for this important workshop. The workshop agenda will follow in the weeks to come.


The 19th Colloquium for Information Systems Security Education (CISSE)

Date/Time: June 15 - 17, 2015
Location: JW Marriott Resort & Spa, Las Vegas, Nevada
Register: To register, click here.
Contact: To contact someone about this event see this.

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information, is vital to the continuity and security of business. The Colloquium's goal is to work to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula.

For 18 years The Colloquium for Information Security Educators (CISSE) has supported Cyber Security educators, researchers and practitioners in their efforts to improve curricula and foster discussion of current & emerging trends.

For more information about the Colloquium: http://www.cisse.info/


SANS CyberTalent Fair

Date/Time: May 14, 2015 - 12:00PM to 6:00PM (EDT)
Host: SANS
Register: To learn more and to register, visit this link.

The SANS CyberTalent Fair (SCTF) is a two-day, innovative virtual meeting place (formerly called the National Cybersecurity Career Fair) for the top cybersecurity employers and jobseekers in the United States. For attendees, it is a unique opportunity to learn more about current opportunities in the cybersecurity community and interact on a one-on-one basis with leading employers in the field. Powered by SANS, job searching and networking with employers has never been easier.


US Cyber Challenge: Cyber Quests

Host: Counter Hack Challenges
Register: Registration for Cyber Quests can be found here.

Cyber Quests are a series of fun but challenging on-line competitions allowing participants to demonstrate their knowledge in a variety of information security realms. Each quest features an artifact for analysis, along with a series of quiz questions. Some quests focus on a potentially vulnerable sample web server as the artifact, challenging participants to identify its flaws using vulnerability analysis skills. Other quests are focused around forensic analysis, packet capture analysis, and more. The quests have varying levels of difficulty and complexity, with some quests geared toward beginners, while others include more intermediate and ultimately advanced material.

A portion of the US Cyber Challenge, winners qualify for a spot at a summer USCC Summer Camp. More information about that camp can be found here.

Registration

Quiz


2015 National CyberWatch Center Webinars

Date/Time: All webinars are 30 minutes (except the one on Feb. 27th) and will begin at 11 a.m. ET.
Host: National CyberWatch Center
Register: Register here!
Contact: For questions regarding trainings, contact Lynn Dohm at ldohm@nationalcyberwatch.org.

Google Hangout Invitations will be sent to the email address you provide the day before the webinar. All webinars are 30 minutes (except the one on Feb. 27th) and will begin at 11 a.m. ET.

Don't delay, seats are limited!

The webinars are as follows:

Cyber Security Education Consortium (CSEC) Resources: February 27, 2015

Making Sense of Virtualization Degrees/Certificates/Certifications for Colleges/Universities: March 27, 2015

National Cyber League for the Classroom: April 24, 2015

National Centers of Academic Excellence in Information Assurance/Cyber Defense (CAE): Program Updates and Support: May 29, 2015

Q&A with Representatives from the Advanced Cyberforensics Education (ACE) Consortium: August 28, 2015

Q&A with Representatives from CyberWatch West: September 25, 2015

Content is King: National CyberWatch Center Curriculum Updates & What it Means for Your Institution: October 30, 2015

Stop.Think.Connect Program: November 20, 2015


2015 Train-the-Trainer Workshops

Host: National CyberWatch Center and National Resource Center for Systems Security and Information Assurance
Register: CLICK HERE to CHECK out the OFFERINGS!
Contact: For questions regarding trainings, contact Lynn Dohm at ldohm@nationalcyberwatch.org.

National CyberWatch Center and the National Resource Center for Systems Security and Information Assurance are pleased to announce the spring/summer training schedule.

CISSP, Netlabs User Community Workshop, SCADA and many more!

Don't delay, seats are limited!

Cyber Quests Webinar Distance Learning, Various Cities

(ISC)²® CISSP® Course Distance Learning, Various Cities

ISACA Cybersecurity Fundamentals Certificate Distance Learning, Various Cities

The Art of Penetration Testing - Teaching Ethical Hacking College of Southern Nevada, North Las Vegas, NV

The Internet of Things ~ Network Security is Everything! College of Southern Nevada, North Las Vegas, NV

Using Cybersecurity Related Websites in the Classroom College of Southern Nevada, North Las Vegas, NV

Netlabs+ User Community Workshop Distance Learning, Various Cities

CSSIA 2015 Version of Security+ Distance Learning, Various Cities

SCADA Distance Learning, Various Cities

Netlabs+ User Community Workshop Distance Learning, Various Cities

(ISC)²® CISSP® Course Distance Learning, Various Cities

(ISC)²® SSCP® Course Distance Learning, Various Cities


Faculty Opportunity: Travel opportunity to the 2014 National Initiative for Cybersecurity Education (NICE) conference and expo

Date/Time: November 5-6, 2014
Location: Sheraton Columbia Town Center Hotel in Columbia MD
Host: National Initiative for Cybersecurity Education
Register: Travel Application Form Link
Contact: Click here to contact NICE

National Initiative for Cybersecurity Education (NICE) will be having its 5th Annual Cybersecurity Education Conference. Contingent on funding from the National Science Foundation, the National CyberWatch Center will pay travel expenses for selected faculty from the national academic community to attend the 2014 NICE Conference and Expo. Preference will be given to faculty who do not currently have grant support to attend cybersecurity conferences such as this.

The 5th Annual NICE conference promises to be highly informative - you will be able to see the Agenda on the NICE website. In addition to receiving valuable information, participants will have an outstanding opportunity to network and talk to professionals in government, professional associations and industry.

Please pay attention to the note at the bottom of the Travel Application Form with directions how to proceed.


Digital Forensics Special Interest Group (SIG) – Fall 2014

Date/Time: This SIG meets on 2 Monday afternoons per month from 2:00 – 3:00 PM during the Fall Semester of 2014.
Location: Cybercrime Training Lab 2, Second Floor of Dickinson Hall , Hackensack side of Metro Campus
Host: Fairleigh Dickinson University
Contact: Eamon P. Doherty doherty@fdu.edu

The SIG is for full or part time FDU students. The SIG will help students learn about mobile device forensics. Equipment, tools, policy, and techniques will be both demonstrated and discussed. It is free to attend.

Prof. Eamon P. Doherty Ph.D., SSCP, CPP, CCE

Week 1: GPS Device Forensics

Week 2: IPAD Forensics

Week 3: Digital Camera Forensics

Week 4: Pager Systems Forensics (3.5 million in use in USA, 2012)

Week 5: Steganography, Data Carving, Detecting Steganography

Week 6: Look at Chain of Custody, Computer Usage Policy, Internet Policy, Phone Policy, and the Importance of General Counsel and HR

Week 7: Going to Conferences, Writing Papers, the Importance of Publishing, Networking

Week 8: CCTV Intro

Week 9: Intro to Logic Cub

Week 10: Legacy Media Forensics (CF Cards, Jazz Disks, Zip Disks, 3.5, 5.25” and 8 Inch Diskettes, XD Cards)


Student Opportunity: The National Cyber League (NCL) Invitation for student. Pre/Regular season registration is on

Date/Time: Fall 2014 Season; The Pre/Regular Season registration runs from August 23-September 20.
Host: National Cyber League
Cost: The Fall Season registration is $20 per player for the Pre/Regular Seasons and $25 per Post Season team.
Contact: info@nationalcyberleague.org

The National Cyber League (NCL) is pleased to offer a Fall 2014 season!

The NCL is an intercollegiate cybersecurity competition developed by National Science Foundation funded centers to make cybersecurity learning and practice fun and engaging.

Even students new to competitions can compete in three Capture the Flag competitions, thanks to our exclusive bracketing system.Prepare for CompTIA Security ™ and EC-Council Certified Ethical Hacker (CEH)™ certifications with labs and games and build some serious skills along the way. Faculty coaches get freeinstructor syllabi, to help integrate the NCL experience into classes, as well as free hosted lab and game environment access.

We are committed to continuing to improve the NCL experience and hope you will participate in the 2014 Fall Season. Feel free to reach out with any questions.

Please spread the word! (To join the NCL mailing list, have faculty and students send an email with their name, email address, student or faculty status, and college/university affiliation to info@nationalcyberleague.org.)


The 2014 International Conference on Frontiers in Education: Computer Science and Computer Engineering

Date/Time: July 21 to 24, 2014
Location: Monte Carlo Resort, Las Vegas, USA
Host: FECS
Register: Click here to register for the Colloquium

Conference Description: FECS is an international conference that serves researchers, scholars, professionals, students, and academicians who are looking to both foster working relationships and gain access to the latest research results. Learn more here.


Listen to General James E. CartWright at NIKSUN WWSMC Summer '14

Date/Time: June 25th & 26th 2014
Location: DoubleTree by Hilton Hotel Princeton, NJ, 4355 US Route 1, Princeton, New Jersey, 08540
Host: NIKSUN
Contact: If you have any questions, please feel free to contact marketing@niksun.com or T: 1-609-452-2400

It is with great pride and pleasure that we invite you and your colleagues to attend the NIKSUN World Wide Security and Mobility Conference (WWSMC), Summer ‘14, being held in Princeton, NJ on June 25th and 26th, 2014. The opening day, June 25th is open to the general public, while the second day is for NIKSUN resellers/Partners only. Come join us to learn about the latest advances in cybersecurity and mobility, network with your colleagues, and perhaps learn something new to take back with you!

Hear keynote speech by General James E. Cartwright, Former Vice Chairman of the Joint Chiefs of Staff, eminent cybersecurity expert, Dr. Parag Pruthi, CEO of NIKSUN. Listen to leading cybersecurity experts from the telco, government, and enterprise sectors talk about the latest innovations and state-of-the-art advances in cyber and mobile security.

Visit our website for detailed agenda.

To ensure that you get the most out of NIKSUN WWSMC Summer ‘14, we encourage you to register today. Space is limited so advanced registration is required.

We look forward to seeing you at this exciting event!


The 18th Annual Colloquium for Information Systems Security Administration

Date/Time: June 16-18, 2014
Location: San Diego, California
Register: Click here to register for the Colloquium

Colloquium Description:
The Colloquium for Information Systems Security Education recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels. See complete agenda here.


17th Annual New York State Cyber Security Conference (NYSCSC ’14) and 9th Annual Symposium on Information Assurance (ASIA ’14)

Date/Time: June 3 - 4, 2014
Location: Empire State Plaza in Albany, NY
Register: Register today at www.dhses.ny.gov/go/conference2014
Contact: - Free to government and public sector employees - $50 for not-for-profit employees* - $200 for private sector employees*

*Group discount of 20% for 5 or more employees from the same organization.

Please join us to hear from prominent security experts presenting the latest topics and issues in cyber security. The June 3 keynote will be provided by the Governor’s Cyber Security Advisory Board.

NEW FOR 2014: Hands-on training classes in Digital Forensics and Cyber Incident Analysis and a Cyber-Challenge!

About the Symposium: This two day event is co-hosted by the New York State Office of Information Technology Services’ Enterprise Information Security Office, the University at Albany’s School of Business and College of Computing and Information, and The NYS Forum, Inc.


The 23rd Wireless and Optical Communication Conference (WOCC 2014)

Date/Time: May 9 - 10, 2014
Location: New Jersey Institute of Technology, 154 Summit Street, University Heights, Newark, 07102
Host: New Jersey Institute of Technology and sponsored by IEEE

Call for Papers Deadline February 15, 2014; Acceptance Notification March 15, 2014
Learn more

Original technical papers are solicited on the topics including, but not limited to, the following:

  • Wirless Symposium Networks Symposium
  • Optical Symposium Big Data Symposium

About the Conference:
The 23rd Annual Wireless and Optical Communications Conference (WOCC 2014) will provide a unique opportunity to explore the leading areas of wireless and optical communications technologies, future network and big data.


The National CyberWatch Center

Date/Time: A monthly series at 11 am EST (see link below for dates and topics)
Location: A monthly Webinar Series
Host: National CyberWatch Center
Register: HERE

The National CyberWatch Center presents a monthly webinar series to discuss Cybersecurity Education and Workforce Development. See Flyer for more information!!

Webinar topics and schedule follow:

National Curriculum - What are the benefits of mapping my curriculum to the National Cybersecurity Workforce Framework? - How does this help for articulating AAS degrees to bachelor degrees? - What are the advantages of competency-based assessments?

Conducting Classroom-Based Research - How can I increase what I know about my students and improve what they learn? - What methods can I use to learn what works with my students AND makes my job easier? - What do I need to know to get started?

National Cybersecurity Student Association - Why should I encourage students to join? - What are the students saying? - How can industry and government help?

National Cybersecurity Workforce Framework 2.0 - What are the differences between 1.0 and 2.0?- Why did they change? - What are the opportunities for program development?

National Cyber League for the College Classroom - What is it? - How does it benefit me and my students? - How can I get started?

Security Clearances - What’s new? - What is most important to know? - What can we do to prepare students?

Critical Skills for Industry and Government - What skills do industry and government want? - Which skills are well covered in current programs? - What critical skills are still needed?

Cybersecurity Program Capacity Building - So I built it, why didn't they come? - Why do programs fail? - Where do I look for faculty resources?


Digital Forensics Special Interest Group (SIG) – Spring 2014

Date/Time: The SIG meets on 2 Monday afternoons per month from 2:00 – 3:00 PM during the Spring Semester of 2014.
Location: Cybercrime Training Lab 2 on the second floor of Dickinson Hall, Fairleigh Dickinson University, Teaneck, NJ 07666
Contact: Eamon P. Doherty doherty@fdu.edu

The SIG is free to attend and is for FDU full or part time faculty, staff, and students. The SIG will help people learn about mobile device forensics, equipment, tools, policy, and techniques. Practical demonstrations and theory are part of the SIG.

Prof. Doherty Ph.D, SSCP, CCE, CPP

Week 1 – GPS Devices

Week 2 – IPAD Forensics

Week 3 - Digital Camera Forensics

Week 4 – Pager Systems (3.5 million in use in USA in 2012)

Week 5 – Steganography, Detecting Steganography

Week 6 – Chain of Custody, Computer Usage Policy, Phone Policy, Importance of General Counsel and HR

Week 7 – Going to Conferences, writing papers, the importance of publishing

Week 8 – CCTV Intro

Week 9 – Intro to Logic Cube

Week 10 - Legacy Media Forensics (CF Cards, Jazz Disks, Zip Disks, XD cards, 3.5, 5.25, and 8 inch floppy diskettes

Week 11 – Software to help parents keep kids safe


2013 Information Security Curriculum Development Conference (InfoSecCD2013)

Date/Time: October 11-12, 2013
Location: Kennesaw State University, Georgia
Register: Register and learn more: http://infosec.kennesaw.edu/infoseccd/

Summit Description:
InfoSecCD seeks to provide academics, researchers, and practitioners with an opportunity to share their perspectives with others interested in the various aspects of Information Security Curriculum Development. Papers offering novel research contributions in any aspect of information security education are solicited for submission to the 2013 InfoSecCD Conference.

The primary focus is on high-quality, original, unpublished research, case studies, and implementation experiences. Papers should have practical relevance to the design, development, implementation, and best-practices in information security education or for best-practices in the design, implementation, and management of information security or digital forensics.


The 2013 NICE Workshop: Navigating the National Cybersecurity Education InterState Highway

Date/Time: September 17-19, 2013
Location: Gaithersburg, MD

Workshop Description:
The National Initiative for Cybersecurity Education (NICE) will host its annual “Shaping the Future of Cybersecurity Education Workshop” at the National Institute of Standards and Technology (NIST) location in Gaithersburg, MD. The NICE Initiative is focused on enhancing the overall cybersecurity posture of the United States by accelerating the availability of educational and training resources designed to improve the cyber behavior, skills, and knowledge of every segment of the population.

The 2013 NICE Workshop theme is "Navigating the National Cybersecurity Education Interstate Highway". The Workshop will highlight cybersecurity education concepts, tools, and best practices with a focus on successes at the State and Federal levels. The goal is to highlight cybersecurity awareness, education, and training programs that can be adopted, copied, or used, or built-on by small businesses, educational institutions, industry, and government at the states, local, tribal and Federal levels to advance the strategic goals of NICE.

The workshop asks presenters, panelists, and participants to share information and use lessons learned and best practices to help attendees grow their cybersecurity toolkit and remind everyone of the critical role each plays in advancing the strategic goals of NICE:

  • Raise national awareness about risks in cyberspace;
  • Broaden the pool of individuals prepared to enter the cybersecurity workforce; and
  • Cultivate a globally competitive cybersecurity workforce.

More information about NICE the Strategic Plan and past NICE Workshops can be found by visiting http://csrc.nist.gov/nice/


International Conference on Cyber Security

Date/Time: August 5 - 8, 2013
Location: Fordham University at Lincoln Center, 113 West 60th Street, New York, NY 10023
Register: Click here to register for the Conference
Cost: The cost for ICCS 2013 is $725.

Conference Description: ICCS is the premier global cyber security event spanning three days with more than 85 unique lectures from distinguished speakers from government, the private sector and academia. Each brings unique insights from their expertise in the disciplines of emerging technologies, operations and enforcement, academic and pragmatic experience. A range of keynote presentations, panel discussions, sponsors' presentations, exhibitions and exceptional networking opportunities provide a rare chance to learn and speak with leading cyber security subject matter experts and solution providers from throughout the world.


ICF International's CyberSci Summit 2013

Date/Time: June 25-26, 2013
Location: Arlington Hilton Hotel, Arlington, VA

Registration: CyberSci Summit 2013 event information

Summit Description: ICF International's CyberSci Summit 2013 (formerly known as Network Science and Reconfigurable Systems for Cybersecurity - NSRSC) will present and examine the latest emerging technology applications in next generation and beyond cybersecurity solutions. The goal of this technical gathering is to provide a venue for government, industry, and academia to discuss state-of-the-art and visionary developments spanning emerging technologies to meet the evolving requirements of security in cyberspace. For more information, speaker details, or registration costs, please visit ICFI.com/CyberSci


The 17th Annual Colloquium for Information Systems Security Administration

Date/Time: June 10-12, 2013
Location: Mobile Bay, Alabama
Register: Click here to register for the Colloquium

Colloquium Description: The Colloquium for Information Systems Security Education recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels. See complete agenda here.


7th International Technology, Education and Development Conference INTED2013

Date/Time: March 4 through 6, 2013
Location: Valencia, Spain
Register: Registration link
Contact: For information on the conference contact inted2013@iated.org

Invitees: Representatives from over 70 countries are expected inclusive of lecturers, researchers, academics, educational scientists and technologists from all disciplines and cultures.

Conference Description: The general aim of the conference is to promote international collaboration in Education and Research in all educational fields and disciplines. The attendance of more than 700 delegates from 70 different countries is expected.

Topics: Prospective authors are invited to submit the manuscripts of their original research contributions to iccci2013@siet.ac.in, review articles are also invited. Soft copy (.doc or .pdf formats) of the full papers not exceeding six pages and as per IEEE style which can be found in the conference website shall be submitted for the conference. Further, the paper should contain name of the corresponding author with E-mail ID and affiliation of all authors. Please indicate the discipline of the paper in the subject column of the mail. All the submitted papers will be sent for peer review and the corresponding author will be notified the outcome of the review process. If reviewers recommend for further improvements in the paper, the paper will be sent back to the corresponding author and the revised version should be submitted with in fifteen days on the date of receipt. Proceedings of ICCCI 2013 will be archived in IEEE Xplore Digital library.

Conference Website


IEEE 2013 International Conference on Computer Communication and Informatics (ICCCI 2013)

Date/Time: January 4 – 6, 2013
Location: Coimbatore, India

Invitees: International conference attendees

Conference Description: The International Conference on Computer Communication and Informatics (ICCCI 2013) is technically co-sponsored by IEEE Madras Section and aims to provide an outstanding opportunity for both academic and industrial communities alike to address new trends and challenges and emerging technologies on topics relevant to today's fast moving areas of Computer, Communication and Informatics. The conference will feature invited talks and referred paper presentations. The vision of this international conference is to foster communication among researchers and practitioners working in a wide variety of areas in Communication and Informatics with a common interest.

Topics: Prospective authors are invited to submit the manuscripts of their original research contributions to iccci2013@siet.ac.in, review articles are also invited. Soft copy (.doc or .pdf formats) of the full papers not exceeding six pages and as per IEEE style which can be found in the conference website shall be submitted for the conference. Further, the paper should contain name of the corresponding author with E-mail ID and affiliation of all authors. Please indicate the discipline of the paper in the subject column of the mail. All the submitted papers will be sent for peer review and the corresponding author will be notified the outcome of the review process. If reviewers recommend for further improvements in the paper, the paper will be sent back to the corresponding author and the revised version should be submitted with in fifteen days on the date of receipt. Proceedings of ICCCI 2013 will be archived in IEEE Xplore Digital library.


The International Relation of Cyber Crime

Date/Time: Tuesday, December 4, 2012 at 1:30 – 3:30 p.m. and Wednesday, December 5 at 3:30-4:30 p.m.
Location: Fairleigh Dickinson University (FDU), Edward Williams Hall, 150 Kotte Place, Hackensack, NJ
Host: Fairleigh Dickinson University

Invitees: Open to the general public, faculty, students and staff

Topics on 12/4/12:
(1) The International Relation of Cyber Crime
(2) Public Policy, Politics & Official Corruption

Speaker(s):
(1) Lt. Andrew Donofrio, Ret. Cybercrime Expert, Bergen County Prosecutor's Office and
(2) William "Pat" Schuber, Assistant Professor, School of Administrative Science, FDU

Topic on 12/5/12: An Answer to Gangs, Guns & Drugs
Speaker(s): Larry Spagnola, Chief of Police Ret., and Sergeant John Spano, Ret., Paterson Police Department
Invitees: Admission to these presentations is FREE, open to FDU community and general public


Fourth IEEE International Workshop on Information Forensics and Security

Date/Time: December 2-5, 2012
Location: Tenerife, Spain

Invitees: Open to the scientific community and general public

Webinar Description: A detailed Technical Program can be found http://www.wifs12.org/technical_program.html

Registration link


IEEE Smart Tech Metro Area Workshop

Date/Time: October 19-20, 2012
Location: Crowne Plaza White Plans, Westchester, NY
Cost: $129 for members and $179 for non-members, when you register by 15 September. Early Bird rates extended to 15 September

Invitees: Open to the general public, faculty, staff and students

Workshop Description: The two-day intensive Smart Tech Workshop offer parallel, all-day track sessions that allow attendees to immerse themselves in a given technology. The agenda and course description for each track can be found here. Attendees may choose one full-day track on each day of IEEE Smart Tech, or two half day courses.


Third Cyber Infrastructure Protection Conference 2012

Date/Time: September 13-14, 2012 (see program below for times)
Location: City College of New York, New York, NY10031
Host: CCNY and SSI, US Army War College, and Co-sponsored by IEEE New York Section and Computer Society NYC Chapter, http://www.ccny.cuny.edu/cip.

Invitees: Open to the general public, faculty, staff and students


14th Information Hiding Conference

Date/Time: May 15-18, 2012
Location: Berkeley, California

Invitees: Open to the public, faculty, students and staff.

Course Description: For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in digital rights management schemes. Steganalysis and forensics pose important challenges to digital investigators and privacy techniques try to hide relational information such as the actors' identities in anonymous communication systems. These and other topics share the notion that security is defined by the difficulty to make (or avoid) inference on certain properties of host data, which therefore has to be well understood and modeled.

Topics: Prospective authors are invited to submit the manuscripts of their original research contributions to iccci2013@siet.ac.in, review articles are also invited. Soft copy (.doc or .pdf formats) of the full papers not exceeding six pages and as per IEEE style which can be found in the conference website shall be submitted for the conference. Further, the paper should contain name of the corresponding author with E-mail ID and affiliation of all authors. Please indicate the discipline of the paper in the subject column of the mail. All the submitted papers will be sent for peer review and the corresponding author will be notified the outcome of the review process. If reviewers recommend for further improvements in the paper, the paper will be sent back to the corresponding author and the revised version should be submitted with in fifteen days on the date of receipt. Proceedings of ICCCI 2013 will be archived in IEEE Xplore Digital library.

Program and Speakers
Presentations and Proceedings