Past Events

2017 Cyber Cup Competition

Date/Time: 7-8 June 2017
Location: Von Braun Civic Center Huntsville AL
Register: here

Students Faculty

For The National Cyber Summit Open To Students And Professionals.

On behalf of the 2017 Cyber Cup Competition Planning Committee and our Cyber Range Sponsors Booz Allen Hamilton and Analog Devices, we would like to welcome you to the opening of the 2017 Cyber Cup Competition registration!

The 2nd Annual Cyber Cup Competition will be held during the 2017 National Cyber Summit at the Von Braun Center in Huntsville, AL on June 7th and 8th to continue our objective of inspiring technical skillset development through fun security-focused competitions.

New for 2017, the Cyber Cup Competition will have both a student and professional bracket for better competition within the varying skill levels. The event will follow the same capture the flag format as last year, where teams will solve increasingly difficult challenges across numerous categories including networking, coding, cryptography, and web application hacking.

Teams from each class will participate in one of three qualification rounds and the top 15 teams from each class will qualify for the the Cyber Cup Competition Championship! Each competition will be limited to a total of 45 teams, 90 participants, so we invite you to register your team today! You can find additional information about the competition on the registration pages and invite any questions you might have in preparation for the event.

Regardless of your background, this year's event will provide an excellent opportunity to have fun, learn, and test your ability to effectively navigate today's challenging cyber environments! In addition, it will also give you an opportunity to network with industry leaders needing skillsets that you will demonstrate during the competition! Best of luck as you prepare for the Cyber Cup Competition and we look forward to seeing you there!


National Cyber Summit

Date/Time: The week of June 5, 2017
Location: Huntsville, AL

Faculty

We will be having the CAE Designation ceremony, the CAE Community Meeting, an Academic Track and much more!

For more information visit http://www.nationalcybersummit.com/post-summit-information/ for the posting.


CAE Tech Talk Double Header

Date/Time: 27 Apr 2017
Location: https://capitol.adobeconnect.com/cae_tech_talk/ Just log in as “Guest” and enter your name. No password required.
Contact: CAE Tech Talk events are advertised thru email and posted to the news and calendar section of the CAE community website: www.caecommunity.org

Students

Mark your calendars and come join your friends in the CAE community for a Tech Talk. We are a warm group that shares technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentations using their online delivery platform (Adobe Connect) which employs slides, VOIP, and chat for live interaction. Just log in as “Guest” and enjoy the presentation(s).

CAE Tech Talks are also recorded

Recordings of live presentations are posted to the website below:
https://capitol.instructure.com/courses/510/external_tools/66

Pdf versions of the presentations are posted to the website below:
https://capitol.instructure.com/courses/510/files

CAE Tech Talk events are advertised thru email and posted to the news and calendar section of the CAE community website: www.caecommunity.org

Below is a description of the presentation(s) and logistics of attendance:

Weaponized Crowdsourcing: Threats and Opportunities: 1:10-1:50 pm ET

Audience Skill Level : All Levels
Presenter(s) : Prof. James Caverlee, Texas A&M University, Department of Computer Science and Engineering
Description :
Crowdsourcing systems have successfully leveraged the attention of millions of “crowdsourced” workers to tackle traditionally vexing problems. From specialized systems like Ushahidi (for crisis mapping), Foldit (for protein folding) and Duolingo (for translation) to general-purpose crowdsourcing marketplaces like Amazon Mechanical Turk and Crowdflower - these systems have shown the effectiveness of intelligently organizing large numbers of people. However, these positive opportunities have a sinister counterpart: what we dub “Weaponized Crowdsourcing”.
Already we have seen the first glimmers of this ominous new trend – including large-scale “crowdturfing”, wherein masses of cheaply paid shills can be organized to spread malicious URLs in social media, form artificial grassroots campaigns (“astroturf”), spread rumor and misinformation, and manipulate search engines. Unfortunately, little is known about Weaponized Crowdsourcing as it manifests in existing systems, nor what are the ramifications on the design and operation of emerging socio-technical systems. Hence, this talk shall focus on key research questions related to Weaponized Crowdsourcing as well as outline the potential of building new preventative frameworks for maintaining the information quality and integrity of online communities in the face of this rising challenge.

Secure Embedded Systems Research and Training in the Center for Reverse Engineering and Assured Microelectronics (CREAM): 2:00-2:40 pm ET

Audience Skill Level : All Levels
Presenter : Dr. Kevin Kornegay from Morgan State University
Description :
The Internet of things (IoT) is the inter-networking of physical devices with microcontrollers/processors, software, sensors, actuators, and network connectivity that enable these devices to collect and exchange data. In a more general sense, IoT devices may also be classified as embedded systems. Critical infrastructure such as transportation, smart grid, manufacturing and health care are highly dependent on embedded systems for distributed control, tracking, and electronic data collection. While it is paramount to protect these devices from hacking, intrusion or physical tampering, current solutions are often based on a patchwork of legacy devices, and this model is unsustainable in the long-term. Thus, we have established the Center for Reverse Engineering and Assured Microelectronics (CREAM) to provide the intelligence community with knowledge, solutions, and highly skilled hardware security engineers to help prevent penetration and manipulation of our nation’s critical infrastructures. To achieve this goal, we conduct hardware security research using reverse engineering techniques to evaluate the assurance of IoT devices. We also develop countermeasures and trusted platform module designs to secure these devices against sensitive data extraction, disruption, diversion, and obfuscation. In this talk, we will highlight some of the secure embedded systems research and student training activities.


Cyber Quests

Date/Time: Competition from April 3 - April 23, 2017

Students

Are you talented enough? Top performers will be invited to one of the 2017 U.S. Cyber Challenge Summer Camps and receive training by cybersecurity professionals. Students are invited to compete for a spot at these camps via the Cyber Quests Competition.
Cyber Quests is an on-line competition that tests participants’ abilities to identify vulnerabilities in a virtual network and answer questions related to their findings. The competition will be held from April 3 - April 23, 2017.
At the summer cyber camps, students will engage in training sessions and exercises on topics ranging from intrusion detection to forensics. These classes will be taught by industry professionals and accompanied by workshops, labs, and competitions, conducted in-person by faculty members from various universities, security practitioners across industries and the U.S. government.
Each camp will also provide students the opportunity to engage with major technology companies and government agencies at job fairs. Some students may also be eligible for additional prizes and recognition.

Registration: March 20 - April 22, 2017

Register at USCC.CyberQuests.org .


The 26th Wireless and Optical Communications Conference (WOCC 2017)

Date/Time: April 07-08, 2017
Location: NJIT, Newark, New Jersey, U.S.A.
Register: Paper submission website: https://edas.info/index.php?c=23111

Faculty

26th Annual Wireless and Optical Communications Conference (WOCC 2017) will provide a unique opportunity to explore the leading areas of wireless and optical communications technologies, future network, big data, and the internet of things (IoT).

Original technical papers are solicited on the topics including, but not limited to, the following:

Wireless Symposium

  • PHY/MAC technologies for 5G
  • mmWave technologies for 5G
  • MIMO technologies (massive MIMO, full dimension MIMO, etc.)
  • Cross-layer design and radio resource management
  • Multi-cell cooperation and interference management
  • Mobile ad-hoc and wireless sensor networks
  • Small cell and heterogeneous networks
  • Cognitive radios and networks
  • Green communications and networking
  • Vehicular communication networks
  • Wireless body area networks
  • Emerging mobile applications and services
  • Cloud radio access networks
  • Wireless network modeling and performance analysis
  • Wireless technologies for IoT

Networks Symposium

  • Future internet and next-generation network architectures
  • Networking technologies for IoT
  • Access systems and networks
  • Network virtualization and services
  • Hybrid wireless-optical networks
  • Network security, privacy, survivability, and network resilience strategies
  • Provisioning, monitoring, and management of IP services
  • Overlay networks and P2P networking
  • Social networking and computing
  • Routing issues and technologies
  • Network steganography and steganalysis
  • Cloud computing
  • Software-defined networking
  • Data center networks
  • Information-centric networks

Optical Symposium

  • Fibers and fiber devices/amplifiers/lasers
  • Advanced optical components and modules
  • Waveguide and optoelectronic devices
  • Advanced optical modulation and detection schemes
  • High-speed optical transmissions
  • Optical network applications and services
  • Optical access networks and fixed-mobile convergence
  • Optical interconnection
  • Nano-photonics and micro/nano optics
  • microwave photonics
  • Optical fiber sensors and networks
  • Quantum and nonlinear optics
  • Visible light communications

Big Data and IoT Symposium

  • Big data models and algorithms
  • Big data visualization and representation
  • Semantic/context aware multimedia representation and processing
  • Big data, IoT, and multimedia search and mining
  • Big data, IoT, and multimedia service architectures
  • Big data, IoT, and multimedia security and privacy
  • Real-time coding, streaming of large volume interactive multimedia
  • Cloud-based big data, IoT, and multimedia computing and communications
  • Big data analytics in social media and IoT
  • Big data applications in healthcare, finance, business, education, etc.
  • Sensor and sensing technologies for IoT
  • Scalable data management for big data and IoT

Conference Organizer
Russell Sun, Nokia

Conference Coordinator
Xin Jiang, CUNY

Program Co-Chairs
Wireless Symposium
Meilong Jiang, Huawei USA
Zhanyang Zhang, C
UNY
Optical Symposium
Xin Jiang, CUNY

Networks Symposium
Hong Zhao, FDU
Big Data
and IoT
Symposium
Hong Man, Stevens

Advisory Committee
James Hwang, Lehigh
Kevin Lu, Stevens
Hsuan-Jung Su, Nat’l Taiwan U.
Grace Wang, NJIT
Yudong Yao, Stevens
Sigen Ye, Nokia
Mengchu Zhou, NJIT

Full Paper Submission: January 31, 2017

Acceptance Notification: February 28, 2017


Cyber Security Summit: Atlanta

Date/Time: Thursday, April 6, 7:45am - 6pm
Location: The Ritz-Carlton, Buckhead
Cost: $350 for Executives, $50 for Government & Military
Contact: CyberSummitUSA.com

Faculty

You are invited to the second annual Cyber Security Summit: Atlanta designed to enlighten Sr. Executives on the latest threat landscape through interactive discussion based sessions & demonstrations with experts from best in class cyber companies. Engage with fellow business leaders during a catered breakfast, lunch & cocktail reception.

Interactive Panels, Discussions & Roundtables:
- The Compliance Nightmare: Using Your Solution Provider as a GPS For Navigating The Perilous Road To Compliance
- What Emerging Risks Are Likely To Become Major Threats Facing IoT and Big Data? What New -
Countermeasures & Cutting Edge Technologies Are Available For Defense?
- Protecting Your Enterprise from Corporate Espionage: Keeping Insider Threats Outside
- Aligning National Public Policy with Cybersecurity Realities

For additional information including full agenda, participating solution providers & confirmed speakers visit: CyberSummitUSA.com .

Career Fair

The 2017 National Cyber Summit (NCS) in Huntsville, Alabama, features a Career Fair the second day of the summit, June 7. The Career Fair brings together a variety of leading employers seeking to fill cyber security job openings.

Upload Your Resume Today
Upload your resume for the NCS Career Fair and start your career journey, today.
NCS Career Fair employers review resumes before the hiring event so they can schedule onsite interviews. They also review resumes after the event, looking for talent that isn’t able to attend the Career Fair.

How You Participate
Create a profile and upload your resume on CyberSecJobs.com, the Career Fair partner of the National Cyber Summit. Even if you can’t make it to Huntsville, employers still get your resume if you pre-register. It’s a quick two-step process at the following link:

Visit https://cybersecjobs.com/nationalcybersummit2017

Need help or have questions? Check in with customerservice@cybersecjobs.com


Reverse Engineering Capture the Flag Competition!

Date/Time: The competition will start at 8am central on Monday, March 27th and end on Friday, March 31st at 10am central.​
Register: Go to http://0xevilc0de.com/ to find more information and sign-up for updates.
Contact: If you have any questions please email joshua.stroschein@dsu.edu .

Students

Dakota State University (DSU) and the University of Nebraska-Kearney (UNK) is hosting a 5 day reverse engineering (RE) capture-the-flag (CTF). The competition will start at 8am central on Monday, March 27th and end on Friday, March 31st at 10am central.​ The challenges will test a variety of skills necessary for any reverse engineer and all skill levels are welcome to apply. The challenges are arranged in categories, with increasingly more difficult challenges in each category. The initial challenges are designed to develop, or test, basic skills and progress to intermediate and then advanced challenges. If you take on the challenge you might have to reverse PDFs, .NET binaries, obfuscated PHP, Javascript, x86, x64,C++, PE, ELF, Mach-O, and so on.

Go to http://0xevilc0de.com/ to find more information and sign-up for updates.
Further instructions will be posted here when the competition goes live.


Integrated Adaptive Cyber Defense (IACD) Community Day

Date/Time: 23 March 2017, 8:30AM – 2:00PM
Location: Kossiakoff Center, Johns Hopkins University, Applied Physics Laboratory (JHU/APL), Laurel, Maryland
Register: Click here .

Students Faculty

You are cordially invited to attend the Integrated Adaptive Cyber Defense (IACD) Community Day on 23 March 2017 at the Kossiakoff Center on the campus of the Johns Hopkins University Applied Physics Laboratory (JHU/APL) in Laurel, Maryland. Sponsored by the Department of Homeland Security and National Security Agency, the goal of IACD is to dramatically change the timeline and effectiveness of cyber defense integration and automation to enable faster response times and increase community awareness and defensive capabilities. IACD is a community effort helping to define the strategy, demonstrate the art-of-the-possible to defenders, and influence the cyber marketplace.

Further information about this event is available at http://www.cvent.com/d/8vqtyt . Security clearances are not required, but registration is requested. If you wish to attend this event, please use the website to register.

Information about IACD and previous IACD Community Days is available at https://secwww.jhuapl.edu/iacdcommunityday/


CAE Tech Talk Double Header

Date/Time: 16 Mar 2017
Location: https://capitol.adobeconnect.com/cae_tech_talk/ Just log in as “Guest” and enter your name. No password required.
Contact: CAE Tech Talk events are advertised thru email and posted to the news and calendar section of the CAE community website: www.caecommunity.org

Students

Mark your calendars and come join your friends in the CAE community for a Tech Talk. We are a warm group that shares technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentations using their online delivery platform (Adobe Connect) which employs slides, VOIP, and chat for live interaction. Just log in as “Guest” and enjoy the presentation(s).

CAE Tech Talks are also recorded

Recordings of live presentations are posted to the website below:
https://capitol.instructure.com/courses/510/external_tools/66

Pdf versions of the presentations are posted to the website below:
https://capitol.instructure.com/courses/510/files

CAE Tech Talk events are advertised thru email and posted to the news and calendar section of the CAE community website: www.caecommunity.org

Below is a description of the presentation(s) and logistics of attendance:

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data: 1:10-1:50 pm ET

Audience Skill Level: All Levels
Presenter(s): Nolen Scaife (University of Florida)
Description:
Ransomware is a growing threat that encrypts a user’s files and holds the decryption key until a ransom is paid by the victim. This type of malware is responsible for tens of millions of dollars in extortion annually. Worse still, developing new variants is trivial, facilitating the evasion of many antivirus and intrusion detection systems. This talk presents CryptoDrop, an early-
warning detection system that alerts a user during suspicious file activity. Using a set of behavior indicators, CryptoDrop can halt a process that appears to be tampering with a large amount of the user’s data. Furthermore, by combining a set of indicators common to ransomware, the system can be parameterized for rapid detection with low false positives. Our experimental analysis of CryptoDrop shows it stops ransomware from executing with a median loss of only 10 files (out of nearly 5,100 available files). Our results show that careful analysis of ransomware behavior can produce an effective detection system that significantly mitigates the amount of victim data loss.

Transfer Learning for Network Security: 2:00-2:40 pm ET

Audience Skill Level: Intermediate
Presenter: Dr. Sachin Shetty (Old Dominion University)
Description:
Machine learning techniques have been employed in detecting occurrence of malicious attack and classification of malware families. Most machine techniques for malware detection are effective in building classifiers in the presence of labeled dataset. The availability of labeled dataset also hinges on the assumption that we can build predictive models of dynamic threats based on prior models of adversarial behavior. At the same time it is time consuming and impractical to generate labeled dataset.
In this talk, I will techniques that builds on existing models of adversarial behavior to extend to environments characterized by diversity of systems, networks and users. Specifically, I will discuss transfer learning technique to detect threats to computer systems and networks. Transfer learning utilizes labeled data in a source domain to help to train better models in the target domain with insufficient or no labels. To the best of our knowledge, this is the first effort to use a feature-based transfer learning technique to detect malware. The premise of the technique is to find a common latent feature subspace for the source and target domain by minimizing the difference between the data distributions while preserving the original discriminative data far apart. The technique can project the source and target data onto the new latent subspace. Furthermore, this technique can be used with any type of classifier on the transformed source data and does not need labeled target data. We evaluated the technique on publicly available datasets and results demonstrate the effectiveness of transfer learning to detect network attacks.


CAE Community: Virtual Career Fair

Date/Time: Friday February 17, 2017 11AM - 4PM EDT
Register: Reserve your spot here
Contact: For questions and more information go to caecommunity.org

Students

Interview for Internships & Jobs Across the Nation

WHO IS INVITED?
Students in cybersecurity degrees from schools designated as Centers of Academic Excellence in Cybersecurity (CAE-C), Cyber Defense (CAE- CD), Cyber Operation (CAE-CO).

WHAT ARE THE BENEFITS?
- Virtual exhibit hall and employer booths
- Be included in résumé book for employers
- Easy-to-use virtual environment with tech-support
- Instant live chat with employers
- No travel No Cost


CAE Tech talk Double Header

Date/Time: Thursday 16 Feb 2017
Location: https://capitol.adobeconnect.com/cae_tech_talk/
Just log in as “Guest” and enter your name. No password required.
Contact: For questions on CAE Tech Talk, please send email to CAETechTalk@nsa.gov

Students

Mark your calendars and come join your friends in the CAE community for a Tech Talk. We are a warm group that shares technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentations using their online delivery platform (Adobe Connect) which employs slides, VOIP, and chat for live interaction. Just log in as “Guest” and enjoy the presentation(s).

CAE Tech Talks are also recorded
Recordings of live presentations are posted to the website below:
https://capitol.instructure.com/courses/510/external_tools/66
Pdf versions of the presentations are posted to the website below:
https://capitol.instructure.com/courses/510/files

CAE Tech Talk events are advertised thru email and posted to the news and calendar section of the CAE community website: www.caecommunity.org

Below is a description of the presentation(s) and logistics of attendance:

Sensor-based Mobile Web Fingerprinting and Cross-site Input Inference Attacks: 1:10-1:50 pm ET

Audience Skill Level: All Levels
Presenter(s): Chuan Yue (Colorado School of Mines)
Description:
Smartphone motion sensor data are not only accessible to native mobile apps, but have also become accessible to the webpages rendered in either mobile browsers or the WebView components of mobile apps. In this talk, I highlight four types of broad and severe user fingerprinting and cross-site input inference attacks that can exploit the smartphone motion sensor data to compromise mobile web users' privacy and security; I also discuss some research topics for further investigating the effectiveness of these attacks and designing usable defense mechanisms.

Knowledge-based Decision Making for Simulating Cyber Attack Behaviors: 2:00-2:40 pm ET

Audience Skill Level: Intermediate
Presenter: Steve Moskal and Dr. Shanchieh Jay Yan (Rochester Institute of Technology)
Description:
Recent high-profile data breaches has caused a shift in the cyber security field to focus more on prevention of cyber attacks as opposed to detection of threats. Security assessments of enterprise computer networks by the use of vulnerability assessment tools and penetration tests are now common and in most cases a requirement. Despite these prevention techniques, recent data breaches are causing billions of dollars of losses to companies as current techniques are not capable of exposing all issues in a network. CASCADES (Cyber Attack Scenario and Network Defense Simulator) is a cyber attack scenario simulation platform that exposes the relationship and dependency of the cyber attacker's behaviors to the physical network configuration. By modeling both the network and the attacker it is possible to understand how an attacker effects a network but also how a network configuration effects the attacker's progress given an attack scenario. CASCADES employs a knowledge-based behavior model representing the capabilities, opportunities, intent, and preferences of the individual attacker to aid in the understanding of the key information the attacker needed to make decisions as the attack progresses. By representing the attacker based on the knowledge developed throughout an attack and how the attacker uses that information along with the integration of the Cyber Attack Kill Chain, CASCADES provides the capability of representing a wide variety of attackers while still maintaining realistic attack scenarios. This allows the generation of many attack graphs while maintaining accuracy along with understanding the interplay between the attacker and the defender without requiring an expert to configure. Results of CASCADES shows both the types of attackers play a large role in how resilient a network is to an attack but also the effects of how a misconfigured network has on the attacker's progress.


CAE Tech Talk Double Header

Date/Time: Thursday 26 Jan 2017
Location: https://capitol.adobeconnect.com/cae_tech_talk/
Contact: For questions on CAE Tech Talk, please send email to CAETechTalk@nsa.gov

Students

CAE Tech Talks are also recorded
Recordings of live presentations are posted to the website below:
https://capitol.instructure.com/courses/510/external_tools/66
Pdf versions of the presentations are posted to the website below:
https://capitol.instructure.com/courses/510/files

CAE Tech Talk events are advertised thru email and posted to the news and calendar section of the CAE community website: www.caecommunity.org

Consumer Privacy vs Data Mining: Issues with Smart Meter Data: 1:10-1:50 pm ET

Audience Skill Level: Intermediate, Advanced
Presenter(s): Vitaly Ford (Tennessee Tech University)
Description:
Smart Grid technologies have been revolutionizing the legacy power grid through advanced sensor networks, two-way communication capabilities, and immediate detection of outages. As a critical part of the Smart Grid, the Advanced Metering Infrastructure (AMI) can provide granular energy consumption data and report them to a utility company, utilizing electrical smart meters. This talk will address an intricate challenge in AMI concerning a protocol supporting consumer privacy protection within the energy consumption data analysis. We will discuss security issues in the existing AMI infrastructure and demonstrate how data can be secured in a privacy-preserving way without losing data mining opportunities. The proposed AMI protocol is based on a certificateless public key encryption that is used as a baseline for establishing a session key. Utility companies will be able to perform an energy consumption data analysis and maintain consumer privacy. At the same time, consumers will be able to retrieve their own data and keep their true identity anonymous. This talk will conclude with a discussion about various attacks on the protocol and address a novel energy consumption differential attack against consumers.

Defeating Malware Packing and Code Obfuscation Techniques: 2:00-2:40 pm ET

Audience Skill Level: Intermediate
Presenter: Josh Stroschein (Dakota State University)
Description:
Modern malware goes to great lengths to thwart detection and analysis during distribution, infection and operation. In this talk we’ll discuss common techniques used by modern malware to hide its intentioned functionality through packing, obfuscation and anti-analysis techniques. We’ll cover effective approaches that a malware analyst can use to peel back these layers and reveal the malwares true purpose. Topics include, but not limited to, reverse engineering, static and dynamic analysis, use of debuggers, and IDA Python.


IEEE Lunch and Learn: Ten Steps to Designing IoT Prototype

Date/Time: 12:30 PM, Thursday, December 8, 2016, pre-meeting pizza starting at 12:15 PM.
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Contact: For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu ; or Alfredo Tan, tan@fdu.edu ; or Howard Leach, h.leach@ieee.org

Students

About the Speaker

Dr. Kevin W. Lu is an adjunct professor of electrical and computer engineering at Stevens Institute of Technology, teaching graduate courses on the internet of things, special problems in electrical engineering (EE), and thesis in EE. He is an IEEE senior member and a member of IEEE for 36 years. He has served as Chair (2012-2013) and Advisor of the ComSoc Standards Development Board, and a member of the IEEE Standards Association (IEEE-SA) Standards Board (SASB) and its Industry Connections Committee (ICCom) and New Standards Committee (NesCom). He is a member of the IEEE SCC42 Standards Coordinating Committee on Transportation, and the IEEE-SA contact for the ITU-T Global Standards Collaboration (GSC) Task Force on Emergency Communications. Previously, he was a chief scientist and executive director at Ericsson/Telcordia Applied Research, and a senior principal scientist at Broadcom. He received B.S. in control engineering from National Chiao Tung University, and M.S. and D.Sc. in systems science and mathematics from Washington University in St. Louis.

About the Talk

Advances in single-board computers and cloud platforms facilitate prototype development for the internet of things (IoT). This presentation provides examples of sensors, development boards, and cloud platforms, then describes ten steps to designing IoT prototype using a smart lighting project as an example. The first eight steps involve specifications of requirements, process, domain model, information model, services, complexity level, functional view, and operational view. The remaining two steps are device and component integration, and application development. The demonstration includes running a Django server and controller in Python on a Raspberry Pi 3.

Sponsors

IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering

All are welcome!

You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 12:15 PM.


CAE Tech Talk

Date/Time: 8 Dec 2016
Location: https://capitol.adobeconnect.com/cae_tech_talk/
Contact: For questions on CAE Tech Talk, please send email to CAETechTalk@nsa.gov

Students

Mark your calendars and come join your friends in the CAE community for a Tech Talk. We are a warm group that shares technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet, so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentations using their online delivery platform (Adobe Connect) which employs slides, VOIP, and chat for live interaction. Just log in as “Guest” and enjoy the presentation(s).

CAE Tech Talk events are advertised thru email and posted to the news and calendar section of the CAE community website: www.caecommunity.org

Below is a description of the presentation(s) and logistics of attendance:

Preserving Cellphone Privacy - Countering IMSI Catcher Technology: 1:10-1:50 pm ET

Audience Skill Level: All Levels
Presenter(s): Dr. Bill Butler (Capitol Technology University)

International Mobile Subscriber Identity (IMSI) Catcher technology is being used by its operators to compromise consumer cell phone privacy within the United States. These compromises of consumer cell phone privacy are conducted by illegal intercept and MitM attacks. Despite efforts by organizations concerned with privacy, such as the American Civil Liberties Union (ACLU), to inform the U.S. Congress, and the public, of the threat, no significant legislation has resulted to direct network operators to protect consumers. Today, countermeasures are being developed by scientists, software and hardware vendors, however these measures have not been categorized within an accepted framework such as the National Institute of Standards and Technology Risk Management Framework (NIST RMF) for consumers to evaluate these countermeasures against the three pillars of cyber security confidentiality, integrity and availability.

Stream-Splitting Moving Target Network Defenses: 2:00-2:40 pm ET

Audience Skill Level: All Levels
Presenter: Josh Klosterman, Daniel Burwitz, and Jacob Williams (Dakota State University)

This project aims to research Multipath TCP and Multi-homed Networking, and apply those concepts towards a Moving Target Defense. This is done by sending TCP streams over the internet using different routes and paths, making it harder for an attacker to intercept any useful information. We’re creating our own implementation, and we hope this will benefit our nation’s cyber security efforts in the future.


Digital Forensics Special Interest Group Fall 2016

Date/Time: Meets Tuesday 5:45 PM – 6:15 PM Starting Tuesday November 1, 2016
Location: Cybercrime Lab Conference Room 2nd Floor, Metro Campus, Dickinson Hall
Cost: It is free and there are no prerequisites to attend. It is open to faculty, staff, and students at all campuses of FDU.
Contact: doherty@fdu.edu

Students

Week 1: November 1, 2016

We will learn to forensically wipe a hard drive with a Logic Cube and discuss why hard
drives need to be wiped.

Week 2: November 8, 2016

We will learn to forensically copy a hard drive with a Logic Cube and discuss why it is
necessary.

Week 3: November 15, 2016

We will take a cloned hard drive and preview it with the help of a write blocker.

Week 4: November 22, 2016

We will learn about beepers and where one may go to have one examined.

Week 5: November 29, 2016

We will learn about floppy disks and forensically examine one.

Week 6: December 1, 2016

We will learn to forensically examine a legacy cell phone and collect the evidence with a
popular cell phone forensic tool.


SecCPS-2017 Call for Papers: 18th IEEE International Symposium on High Assurance Systems Engineering (HASE) 2017

Date/Time: January 12 - 14
Location: Singapore
Register: To see guidelines for this call for papers and submit your own, click here .
Contact: hase2017@sutd.edu.sg

Faculty

SecCPS-2017: Workshop on Security Issues in Cyber Physical Systems

Theme: High Assurance through Design Innovation

Cyber Physical Systems (CPS) are embedded systems composed of computing elements and physical processes. In the past, CPS were proprietary and not connected to the cyber space; with the advent of networked control systems to enable better operations and monitoring of the physical processes, these systems are increasingly becoming part of cyberspace. Connection to the cyber space enables effective management of public infrastructures such as public transportation, smart grid and water treatment facilities. However, these advantages come with new security challenges.

Attacks on CPS may lead to performance degradation to complete shutdown, or even equipment damage depending on the knowledge, goals and resources of the attacker. Most work in area of CPS security focus on the cyber part and attempts to ensure secure exchange of information across controllers, sensors, and actuators. The nature of security threats and attacks in a CPS is different from those found in pure cyberspace. Threat models have evolved significantly and the fact that any successful attack could be fatal – as it is more than a computer being hacked and disturbs the physical process – may result in dangerous scenarios. It is not only about the consequences of attacks but the fact that besides cyber attacks, attacks on physical devices are also possible: An adversary may add, remove or replace some physical components which may result in severe consequences. Understanding the physical part, and how it can be compromised, is essential to ensure CPS security. Thus focus ought to be on both physical and cyber domains.

SecCPS seeks novel submissions describing practical and theoretical solutions to securing CPS. Submissions may represent any application area for CPS. Hence, papers that are pertinent to the security of embedded systems, Internet of Things, SCADA Systems, Water Systems, Smart-Grid Systems, Critical Infrastructure Networks, Transportation Systems, Medical Devices etc., are welcome.

Important Dates
Submission Deadline: Nov 14, 2016
Acceptance Notification: Dec 12, 2016
Camera Ready: Dec 26, 2016
Workshop Date: Jan 14, 2016

Submission Instructions: Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. All submissions must be written in English with a maximum paper length of 6 (six) pages (including text, figures, and references) and formatted according to the two-column IEEE conference format. Accepted papers will be published in the IEEE Digital Library after the conference and included in the IEEE HASE proceedings. Papers must be submitted through EasyChair.

For more information click here .


CAE Tech Talk: Virtualizing Industrial Control Systems Testbeds for Cybersecurity Research

Date/Time: 10 Nov 2016 (1:10-1:50pm ET)
Location: https://capitol.adobeconnect.com/cae_tech_talk/
Contact: For questions on CAE Tech Talk, please send email to CAETechTalk@nsa.gov

Students

Audience Skill Level: All Levels
Presenter: Thiago Alves (University of Alabama Huntsville)

Performing an extensive security analysis involving experiments with cyber-attacks on a live industrial control system (ICS) is not possible. Therefore, researchers generally resort to testbeds and complex simulations to answer questions related to SCADA systems. However, testbeds might not have all the features of a big and complex ICS.

This presentation goes through the process of virtualizing small physical ICS testbeds to, once in the virtualized environment, scale it up to the size of a real ICS. It also demonstrates some cyber-attacks against one of the physical testbeds and its virtualized counterpart. The results are then compared to identify the fidelity of the virtual testbed.


CAE Tech Talk: Double Header

Date/Time: 20 Oct 2016. Multimedia Forensics - Using Mathematics and Machine Learning to Determine and Image's Source and Authenticity (1:10-1:50 pm ET) and Towards Automatic Extraction, Synthesis, and Prediction of Cyber Attack Scenarios (2:00-2:40 pm ET)
Location: https://capitol.adobeconnect.com/cae_tech_talk/ Just log in as “Guest” and enter your name. No password required.
Contact: For questions on CAE Tech Talk, please send email to CAETechTalk@nsa.gov

Students

Mark your calendars and come join your friends in the CAE community for a Tech Talk. We are a warm group that shares technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet, so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentations using their online delivery platform (Adobe Connect) which employs slides, VOIP, and chat for live interaction. Just log in as “Guest” and enjoy the presentation(s).

CAE Tech Talks are also recorded. CTU will post a recording of the live presentations on its website: https://capitol.instructure.com/courses/510/external_tools/66

Below is a description of the presentation(s) and logistics of attendance:

Multimedia Forensics - Using Mathematics and Machine Learning to Determine and Image's Source and Authenticity

Time: 1:10-1:50 pm ET
Audience Skill Level: All Levels
Presenter: Dr. Matt Stamm (Drexel University)

Digital images play a critical role in today's society. They are frequently used by news agencies during reporting, as evidence during criminal investigations, and as intelligence in many military and defense scenarios. This proves problematic since an information attacker can easily create perceptually realistic forgeries using editing tools such as Adobe Photoshop.

In this talk, I will discuss several multimedia forensic algorithms capable of determining if an image has been manipulated that we have developed at the Multimedia and Information Security Lab (MISL) here at Drexel. Instead of relying on extrinsic security measures such as cryptography, these techniques identify image manipulations and forgeries by exploiting the intrinsic fingerprints left in digital media by editing operations. Additionally, I will discuss how multimedia forensic techniques can determine the source of an image by utilizing traces left in an image by its source camera instead of unreliable or easily falsifiable information sources such as metadata.

Towards Automatic Extraction, Synthesis, and Prediction of Cyber Attack Scenarios

Time: 2:00-2:40 pm ET
Audience Skill Level: All Levels
Presenter: Dr. Jay Yang (Rochester Institute of Technology)

Cyber attacks to enterprise networks have moved into an era where both attackers and security analysts utilize complex strategies to confuse and mislead one another. Critical attacks often take multitudes of reconnaissance, exploitations, and obfuscation techniques to achieve the goal of cyber espionage and/or sabotage. The discovery and detection of new exploits, though needing continuous efforts, is no longer sufficient. This talk will discuss some of the recent research efforts that build upon and beyond the conventional intrusion detection systems. Specifically, we will present our approaches on learning and predicting attack patterns based on IDS alerts, extracting emerging attack behaviors using semi-
supervised learning, modeling and analyzing attack obfuscation, and simulating cyber attack scenarios for diverse attack behaviors and network configurations. This collection of works aims at automatically recognizing and synthesizing models to represent how cyber attacks may transpire in well protected enterprise networks.


Young Faculty Award (YFA) Proposers Day

Date/Time: Registration begins on by September 28, 2016 at 12:00 PM, Event on October 3, 2016 from 2:00 PM to 5:00 PM
Register: Register at http://www.sa-meetings.com/YFAProposersDay

Faculty

The DARPA Young Faculty Award (YFA) program aims to identify and engage rising stars in junior faculty positions in academia and equivalent positions at non-profit research institutions and expose them to Department of Defense (DoD) and National Security challenges and needs. DARPA anticipates soliciting innovative research proposals in the areas of physical sciences, engineering, materials, mathematics, biology, computing, informatics, social science, robotics, neuroscience and manufacturing of interest to DARPA’s Defense Sciences Office (DSO), Microsystems Technology Office (MTO), and Biological Technologies Office (BTO).

Sol. #: DARPA-SN-16-72; Agency: DARPA/DSO

For more information click here .


4th Annual Symposium on Cybersecurity and Internet of Things (IoT): Student Research Poster Competition

Date/Time: Wednesday, September 28, 2016
Register: For more information, and to register click here . For more information about the symposium click here .
Contact: Any questions, please contact Dr. Hong Zhao at zhao@fdu.edu.

Students Faculty

Fairleigh Dickinson University's Center for Cybersecurity and Information Assurance (CCIA) organizing committee invites STUDENTS to submit abstracts of recent work, research results and cutting edge developing technologies in IoT and related security fields. The poster presentation consists of a visual display of research findings combined with an interactive question and answer period with a panel of judges. A total of 10-15 finalists will showcase their posters. A panel of internal and external judges will vote on each presentation. Three (3) outstanding posters will be chosen to receive 2016 IEEE North Jersey Cybersecurity Poster Award Cash Prizes.

Deadlines and Important Dates :
Last Date for Abstract Submission- 11:59 pm Tuesday, 09/06/2016
Notification of Acceptance- Monday, 09/12/2016
Electronic Version of the Poster Due- Wednesday, 09/21/2016
Presentation at the Symposium- 09/28/2016


Application of Game Theory to High Assurance Cloud Computing

Date/Time: 1:30PM, Thursday, September 15, 2016, pre-meeting pizza starting at 1:15 PM.
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Contact: For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu ; or Alfredo Tan, tan@fdu.edu ; or Howard Leach, h.leach@ieee.org

Students

About the Speaker
Charles A. Kamhoua received the BS in electronic from the University of Douala (ENSET), Cameroon, in 1999, and the MS in telecommunication and networking and the PhD in electrical engineering from Florida International University (FIU), in 2008 and 2011, respectively. In 2011, he joined the Cyber Assurance Branch of the U.S. Air Force Research Laboratory (AFRL), Rome, New York, as a National Academies Postdoctoral Fellow and became a Research Electronics Engineer in 2012. Prior to joining AFRL, he was an educator for more than 10 years. His current research interests include the application of game theory to cyber security, survivability, cloud computing, hardware Trojan, online social network, wireless communication and cyber threat information sharing. He has more than 60 technical publications in prestigious journals and International conferences along with a Best Paper Award at the 2013 IEEE FOSINTSI. He has mentored more than 40 young scholars at AFRL counting Summer Faculty Fellow, postdoc, and students. He has been invited to more than 30 keynote and distinguished speeches in the USA and abroad. He has been recognized for his scholarship and leadership with numerous prestigious awards including 30 Air Force Notable Achievement Awards, the 2016 FIU Charles E. Perry Young Alumni Visionary Award, the 2015 AFOSR Windows on the World Visiting Research Fellowship at Oxford University, UK, an AFOSR Basic Research Award, the 2015 Black Engineer of the Year Award (BEYA), the 2015 NSBE Golden Torch Award—Pioneer of the Year, selection to the 2015 Heidelberg Laureate Forum, and the 2011 NSF PIRE Award at the Fluminense Federal University, Brazil. He is currently an advisor for the National Research Council, a member of ACM, the FIU alumni association, NSBE and a senior member of IEEE.

About the Talk
The growth of cloud computing has spurred many entities, both small and large, to use cloud services for cost savings. Public cloud computing has allowed for quick, dynamic scalability without many overhead or long-term commitments. However, concern over cyber security is the main reason many large organizations with sensitive information such as the Department of Defense have been reluctant to join a public cloud. This is due to three challenging problems. First, the current cloud infrastructures lack provable trustworthiness. Integrating Trusted Computing (TC) technologies with cloud infrastructure shows a promising method for verifying the cloud’s behaviors, which may in turn facilitate provable trustworthiness. Second, public clouds have the inherent and unknown danger stemming from a shared platform - namely, the hypervisor. An attacker that subverts a virtual machine (VM) and then goes on to compromise the hypervisor can readily compromise all virtual machines on that hypervisor. We propose a security-aware virtual machine placement scheme in the cloud. Third, a sophisticated attack in a cloud has to be understood as a sequence of events that calls for the detection/response model to encompass observations from varying dimensions. We discuss a method to automatically determine the best response, given the observations on the system states from a set of monitors. Game theory provides a rich mathematical tool to analyze conflict within trategic interactions and thereby gain a deeper understanding of cloud security issues. Theoretical constructs or mathematical abstractions provide a rigorous scientific basis for cyber security because they allow for reasoning quantitatively about cyber-attacks. This talk will address the three cloud security challenging problems identified above and report on our latest findings from this body of work.

Approved for Public Release; Distribution Unlimited: 88ABW-2015-5683, Dated 19 Nov 2015

Sponsors
Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering


Call for Papers: 18th IEEE International Symposium on High Assurance Systems Engineering (HASE) 2017

Date/Time: January 12 - 14, 2017
Location: Singapore
Register: To see guidelines for this call for papers and submit your own, click here .
Contact: hase2017@sutd.edu.sg

Theme: High Assurance through Design Innovation

Important dates (GMT+8)
Submission deadline: 12 September 2016 @ 11:59 PM
Acceptance notification: 10 October 2016
Camera-ready submission: 7 November 2016 @ 11:59 PM

Increasingly complex and interdependent systems require careful design to ensure continued operation in the presence of component failures, natural disasters, software/hardware vulnerabilities, and latent software errors. Such systems span broad range of applicability. Devices such as pacemakers and insulin pumps, aim at better life for individuals, while large public infrastructure such a smart power grid, rapid public transport, and water treatment and distribution, impact the daily lives of a mass of people. Often such systems are interdependent in complex ways implying that flaws in the design of one may affect the behaviour of a system-of-systems.

A key question then becomes “What design innovation is needed to bring about systems whose operation in accordance with functional and non-functional requirements is assured with a very high probability?” HASE 2017 will focus on this and related questions and answers which are of paramount importance to engineers who design and build interdependent complex systems that impact individuals, entire cities and even nations.


Can You Crack the Code? 4th annual Codebreaker Challenge

Date/Time: The challenge will begin on 9 Sep 2016 at 9 pm ET and ends 31 Dec 2016 at midnight.
Register: Students should register on the site using their .edu email addresses. The challenge will be hosted at https://codebreaker.Ltsnet.net
Contact: For support or questions, send email to codebreaker@nsa.gov

Students

This Fall, NSA is launching its 4th annual Codebreaker Challenge. It is a hands-on software reverse engineering challenge where students work to complete mission-focused objectives to push their school to the top of the competition leaderboard. The theme for this year's challenge is "countering Improvised Explosive Devices (IEDs)". Students are given six tasks of increasing difficulty that culminate in developing the capability to permanently disable fictional IED software in a fictional scenario. Feedback from previous challenges indicated students learned a great deal from participating, so with your help, we encourage as much student participation as possible! Here are the pertinent details:

-Small tokens of recognition will be awarded to the first 50 students that complete the challenge nation-wide. In the past, some universities chose to offer additional incentives (extra-credit in a relevant course, an award for the first students to solve the challenge within a department, etc.) We encourage your department to do this if possible!
-Links to software reverse engineering lectures and other educational material can be found on the site.

We hope to have several virtual tech talks over the course of the semester where we will provide an overview of the 2016 challenge, present reverse engineering techniques, and walk through the solution to the challenge from last year. We will also answer questions students may have about the challenge. The dates and times of these tech talks will be made available on the challenge site.


Computational Thinking and Analytical Problem Solving

Date/Time: Grades 4-7: June 20-21, 2016; Grades 8-12: June 22-23, 2016
Location: 285 Madison Avenue, Madison, NJ 07960
Cost: Free
Contact: Dr. Kiron Sharma sharma@fdu.edu

Students

Computational Thinking and Analytical Problem Solving, a CS4HS program sponsored by Google, is designed for teachers and administrators in grades 4-12. You will learn to code while developing practical apps with a Cybersecurity backdrop and user friendly design. Two action-packed days of insights and best practices will empower you to incorporate computational thinking in your teaching and to enthuse your students to explore this rapidly expanding field.

  • Receive year round support from world class faculty and opportunity to be a part of a community of practice for sharing resources and pedagogical techniques.
  • Learn about computational problem solving, basic coding skills and acquire the vocabulary to share concepts in the classroom.
  • Gain an understanding of Cybersecurity and Information Assurance and the role that computer science plays in other disciplines.
  • Prepare to convey the impact of Computer Science on people and communities in a way that engages and excites students.

Space is limited and the programs fill up fast. There will be follow up webinars and two additional meet-ups during the academic year. You will receive 20 hours of Professional Development credit from FDU as well as pedagogical support year round.

Registration for the workshops is via Eventbrite. Please see links below.

Coding & Computational Thinking Grades 4-7: June 20- 21, 2016

Register : http://tinyurl.com/FDU-Coding1

Analytical Problem Solving Through Coding Grades 8-12: June 22-23, 2016

Register : http://tinyurl.com/FDU-Coding


Continuing Education Opportunity: Digital Camera Forensics

Date/Time: Tuesday, March 22, 2016 - 9 AM - Noon
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor Fairleigh Dickinson University, Hackensack
Register: Registration is best with a credit card to 201-692-6500 , A certificate will be mailed to you later.
Cost: The cost is $50 for FDU student and includes a $10 registration.

Students

With Dr. Eamon P. Doherty CCE, CPP, CISSP, SSCP

The course topics include theory or practical training in:

Locard’s Principle of Exchange, chain of custody, test plans, identifying, preserving, collecting, and analyzing digital evidence, metadata, Steganography, data carving, and using tools such as Recover My Files with a few digital cameras and we will also collect and analyze data from SD Cards, forensics is the intersection of law and science, lastly we will demonstrate a nanny cam bear and discuss where digital evidence may be found.

We will also talk about the need for isolated forensic examination computers for use with the cameras as well as write blockers to preserve camera data.


CAE Tech Talk Double Header

Date/Time: Thursday 17 Mar 2016 1:10-1:50pm ET and 2:00-2:40pm ET
Location: https://capitol.adobeconnect.com/cae_tech_talk/
Note: An overflow room is available at the address below:
http://capitol.adobeconnect.com/cae2/
Just login as “Guest” and enter your name. No password required.
Contact: For questions on CAE Tech Talk, please send email to CAETechTalk@nsa.gov .

Students

Mark your calendars and come join your friends in the CAE community for a Tech Talk. We are a warm group that shares technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet, so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentations using their online delivery platform (Adobe Connect) which employs slides, VOIP, and chat for live interaction. Just log in as “Guest” and enjoy the presentation(s).

CAE Tech Talks are also recorded: CTU will post a recording of the live presentations on its website: https://capitol.instructure.com/courses/sis_course_id:CAE_Tech_Talk/external_tools/4

Below is a description of the presentation(s) and logistics of attendance:

New Security Architecture for Internet of Things (IoT)

Time: 1:10 - 1:50 pm ET
Audience Skill Level: All levels
Presenter: Dr. Suku Nair (Southern Methodist University)

Description:

Explosive growth in deployment of Internet of Things (IoTs) is expected industry-wide. However, for wide acceptance of IoT in the marketplace, strong security should be embedded into them. Often, traditional crypto-based security schemes aren’t feasible due to limited power and computational resources available. Recently we have introduced a new security paradigm/architecture, namely security fusion, for such resource constrained massive deployments. The crux of the approach is in synthesizing strong global security properties from weak point-to-point or component security assurances. In this talk we will focus on a fusion technique based on state machine synthesis of security properties. Furthermore, we will discuss new protocols for scalable local device authentication based on PUF (Physical Unclonable Functions) technologies.

Kippo SSH Honeypot Research Application

Time: 2:00 pm – 2:40 pm ET
Audience Skill Level: All levels
Presenter: Miguel Vega (East Carolina University)

Description:

This talk will focus on the development and implementation of a custom built web application used to parse and aggregate firewall and Kippo honeypot logs. The application known as, F4, and is able to extract, categorize, store and query data as well as provide geolocation information about malicious IP addresses, generate charts, tables, figures, timelines and statistics about attacks. Based on the information generated a user is able to determine attack trends by protocol used as well as view SSH commands input attackers who were able to successfully login.

Announcements for CAE Tech Talk events can be found in the news and calendar section of the CAE community website: www.caecommunity.org .


Supply Chain Risk: What is it and how to manage it?

Date/Time: 12:00PM, Wednesday, March 2, 2016, pre-meeting pizza starting at 11:45 AM
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Contact: For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu ; or Alfredo Tan, tan@fdu.edu

Students

About the Speaker

Mr. Pappas has over 17 years of experience as a Senior Security Analyst for the Department of Defense (DoD) and over 16 years as a Software Engineer supporting the DoD and other government agencies. His areas of expertise include Systems Certification and Accreditation, System Security Engineering and Systems Analysis. He holds a B.A. degree in Economics and a M.B.A degree in Business Administration.

About the Talk

Information and Communications Technology (ICT) supply chain risks may include insertion of counterfeits, unauthorized production, tampering, and theft, insertion of malicious software and hardware, as well as poor manufacturing and development practices in the ICT supply chain. These risks are associated with an organization's decreased visibility into, and understanding of, how the technology that they acquire is developed, integrated, and deployed, as well as the processes, procedures, and practices used to assure the integrity, security, resilience, and quality of the products and services. Threats and vulnerabilities created by malicious actors are often especially sophisticated and difficult to detect, and thus provide a significant risk to organizations. ICT Supply Chain Risk Management (SCRM) is the process of identifying, assessing, and mitigating the risks associated with the global and distributed nature of ICT product and service supply chains.

Sponsors
IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Center for Cyber Security and Information Assurance
FDU Gildart Haase School of Computer Sciences and Engineering


Will the Last Robot Leaving the Office Please Turn Out the Lights: Prospects for Robotics in the 21st Century

Date/Time: 1:00PM, Wednesday, February 24, 2016, pre-meeting pizza starting at 12:50PM
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Contact: For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu ; or Alfredo Tan, tan@fdu.edu

Students

Gordon Silverman, PhD
Professor Emeritus, Electrical and Computer Engineering
Manhattan College, Riverdale, New York

Gordon Silverman is Professor Emeritus of Electrical and Computer Engineering at Manhattan College. His professional career spans 60 years and includes corporate, consulting, research, and teaching experience during which he introduced advanced, computer-based, scientific instrument architectures. He is the holder of eight patents including the use of intelligent agents in physical rehabilitation. He is the author of more than 20 journal articles and books and has served on the faculties of The Rockefeller University and Fairleigh Dickinson University in addition to Manhattan where he served as department chair and Interim Dean of Engineering. Furthermore he has held positions as; series editor for McGraw-Hill, ABET program evaluator, and IEEE chapter chair. He has presented numerous invited lectures before technical groups and holds BA, BS, and MS degrees in engineering from Columbia University and received a PhD in system science from New York University Polytechnic School of Engineering in 1972.

About the Talk

Mechanical devices that imitate human behaviors as well as automated computation first appeared 3000 years ago. Contemporary technologies incorporating simulated intelligence embodied in digital computers, environment sensing components, and mechanical effectors have produced machines of extraordinary sophistication and capability; they have the potential to place human labor in countless circumstances and new applications are emerging exponentially. Practitioners and futurists see the ultimate goal of these endeavors as resulting in devices that are not only indistinguishable from, but capable of surpassing, human intelligence and behavior. Various approaches to these goals have materialized including: expert systems, subsumptive architectures, fuzzy logic, neural (autoassociative) networks, and more recently, integration of the human brain with mechanical manipulators as well as development of an organic brain. It is a combined endeavor of neurologists, physiologists, engineers, computer scientists, and psychologists.

Sponsors
IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering


Cell Phone Forensics Continuing Education

Date/Time: Tuesday – February 23, 2016 – 9 AM - Noon
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Register: It is best to register with a credit card to 201-692-6500 and a certificate will be mailed to you later.
Cost: The cost is $50 which also includes the $10 registration.

Students

Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP, CISSP

Here is an opportunity to learn about the vocabulary and tools used in the field of cell phone forensics and why such investigative knowledge is important for both businesses and security professionals.

The course topics include either theory or practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the RCFL, The IACIS, I will demonstrate how to map the coordinates of a digital picture with embedded GPS Data We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.


Digital Forensics Special Interest Group Spring 2016

Date/Time: Meets Tuesday 5:30 PM – 6:15 PM Starting Tuesday January 12, 2016
Location: Cybercrime Lab 2, Dickinson Hall, Metropolitan Campus
Contact: For more information, email Dr. Eamon Doherty .

Students

It is free and there are no prerequisites to attend. It is open to faculty, staff, and students at all campuses of FDU.

Week 1: January 12, 2016

We will discuss some places where digital evidence is kept. Then we will learn to examine a digital picture frame and recover some pictures that were deleted from it.

Week 2: January 19, 2016

We do not meet.

Week 3: January 26, 2016

We will discuss the need for investigators to be able to seize webmail and keep the integrity of the folders. Then we will look at a tool for seizing webmail.

Week 4: February 2, 2016

We will learn to forensically wipe a hard drive with a Logic Cube and discuss why hard drives need to be wiped.

Week 5: February 9, 2016

We will learn to forensically copy a hard drive with a Logic Cube and discuss why it is necessary.

Week 6: February 16, 2016

We will learn to forensically examine a piece of legacy digital media and discuss why it is still necessary.

Week 7: February 23, 2016

We will learn to forensically examine a cell phone and collect the evidence with a popular cell phone forensic tool.


CAE Tech Talk Doubleheader

Date/Time: 18 Feb 2016 - 1:10pm - 2:40pm ET
Location: https://capitol.adobeconnect.com/cae_tech_talk/

Note: An overflow room is available here: http://capitol.adobeconnect.com/cae2/
Register: Just login as “Guest” and enter your name. No password required.
Contact: For questions on CAE Tech Talk, please send email to CAETechTalk@nsa.gov

Students

Mark your calendars and come join your friends in the CAE community for a Tech Talk. We are a warm group that shares technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet, so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentations using their online delivery platform (Adobe Connect) which employs slides, VOIP, and chat for live interaction. Just log in as “Guest” and enjoy the presentation(s).

Below is a description of the presentation(s) and logistics of attendance:

Title/Topic: How secure is your connection to your bank account from a Starbucks WiFi network: Discover SSL/TLS
Time: 1:10 - 1:50 pm ET
Audience Skill Level: Beginner and Intermediate
Presenter: Joseph Vogtembing, Prince Georges County Community College
Description: SSL/TLS is by no means the only way to secure Web and email communications on the Internet, but millions of people use it every day, protecting credit card numbers, online banking sessions, emails, and more. For normal users, seeing the lock icon and "https" in URLs provides confidence that SSL/TLS is keeping us safe. But in reality how safe is it? In this presentation, we will build a physical Lab, implement remote access SSL, and demonstrate what is really happening on the back end of our laptop and the bank account server.

Title/Topic: Web Attack Threat Analysis - Experiences with Glastopf honeypot deployment
Time: 2:00 pm – 2:40 pm ET
Audience Skill Level: Beginner and Intermediate
Presenter: Dr. Safwan Omari, Lewis University
Description: We investigate the use of honeypot for collection and analysis of security cyber threats. Due to their popularity, we target web-based attacks in this work. Glastopf is a well-known web-based oneypot that exposes an attack surface with a few thousand vulnerabilities, which fall into multiple categories including Remote File Inclusion, Local File Inclusion and SQL injection. We deployed Glastopf on a Comcast business network for over a month, we collected a few thousands attacks and more than 80,000 malicious URLs from almost every corner of the world. In this presentation, we share our findings and present through analysis of type of attacks, where these attacks are coming from, and dig deeper into attacker behavior.

CAE Tech Talks are also recorded CTU will post a recording of the live presentations on its website:
https://capitol.instructure.com/courses/sis_course_id:CAE_Tech_Talk/external_tools/4

Announcements for CAE Tech Talk events can be found in the news and calendar section of the CAE community website: www.caecommunity.org


Introduction to Legacy Device Forensics: Continuing Education

Date/Time: Tuesday, February 2, 2016 – 9AM - Noon
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Register: It is best to register with a credit card to 201-692-6500 and a certificate will be mailed to you later.
Cost: The cost is $50 which also includes the $10 registration.

Students

Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP CISSP

The course topics include both theory or practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, the FAT File System, RecoverMyFiles, Logic Cube, Helix V 3.0

We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.


Continuing Education Opportunity: Digital Camera Forensics

Date/Time: Tuesday, January 26, 2016 from 9 AM - Noon
Location: in the Cybercrime Training Lab 1 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Register: Registration is best with a credit card to 201-692-6500 , A certificate will be mailed to you later.
Cost: The cost is $25 for FDU student and $50 for others.

Students

With Dr. Eamon P. Doherty CCE, CPP, CISSP, SSCP

The course topics include theory or practical training in:

Locard’s Principle of Exchange, chain of custody, test plans, identifying, preserving, collecting, and analyzing digital evidence, metadata, Steganography, data carving, and using tools such as Recover My Files with a few digital cameras and we will also collect and analyze data from SD Cards, forensics is the intersection of law and science, lastly we will demonstrate a nanny cam bear and discuss where digital evidence may be found.

We will also talk about the need for isolated forensic examination computers for use with the cameras as well as write blockers to preserve camera data.


CAE Tech Talk: Tripleheader

Date/Time: 21 Jan 2016 from 1 - 3:10pm
Location: https://capitol.adobeconnect.com/cae_tech_talk/ An overflow room is available at the address below:
http://capitol.adobeconnect.com/cae2/ – Just log in as “Guest” and enter your name. No password required.
Contact: For questions on CAE Tech Talk, please send email to CAETechTalk@nsa.gov

Students

Mark your calendars and come join your friends in the CAE community for a Tech Talk. We are a warm group that shares technical knowledge, and CAE Tech Talks are free and conducted live in real-time over the Internet so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentations using their online delivery platform (Adobe Connect) which employs slides, VOIP, and chat for live interaction. Just log in as “Guest” and enjoy the presentation(s).

Below is a description of the presentation(s) and logistics of attendance:

Time: 1pm – 1:40pm ET

Title/Topic: An In-Depth Look at Rainbow Tables

Audience Skill Level: Intermediate

Presenter: Andrew Kramer (student Dakota State University)

Description:

Rainbow tables have become a well-respected and frequently used tool in the information security community, but how do they actually work, and why are they so effective? What makes a rainbow table lookup so much faster than a brute-force search? How is it that such enormous key-spaces can be covered using so little storage space? Take a deeper look at this brilliant tool and you'll marvel at its genius.

Major topics covered in this presentation will include: hash functions, reduction functions, rainbow table generation, and rainbow table searching. Viewers will benefit greatly from prior knowledge of hash functions and their use as a password security mechanism, however this knowledge is not necessarily required. This tech talk is geared towards any person with an interest in “password cracking”, especially students and information security researchers.

Time: 1:45–2:25 pm ET

Title/Topic: Algorithms for Un-keyed Jam Resistance

Audience Skill Level: Intermediate

Presenter: Prof. Ramki Thurimella (University of Denver)

Description:

Communication over noisy channels has been studied quite extensively. In modern communication, achieving jam resistance is much more important as nowadays an attacker can easily obtain a typical jamming device on the open market inexpensively. This is especially critical in military applications as even a brief denial of service attack can severely impact a vital operation. In 2007, Baird, Bahn and Collins proposed an algorithm that is surprisingly simple and elegant. The main advantage of their probabilistic algorithm is that it does not require a shared secret. After reviewing their original algorithm, we will cover some recent developments in this area.

Time: 2:30-3:10 pm ET

Title/Topic: The Application of Current Probabilistic Models to Reasoning about Digital Evidence

Audience Skill Level: All Levels

Presenter: Imani Palmer (student University of Illinois)

Description:

As the use and complexity of digital devices continues to rise, the field of digital forensics remains in its infancy. The investigative process is currently faced with a variety of problems, ranging from the limited number of skilled practitioners, to the difficulty of interpreting different forms of evidence. Investigators are challenged with leveraging recovered evidence to
find a deterministic cause and effect. Without reliable scientific analysis, judgments made by investigators can easily be biased, inaccurate and/or unprovable. Conclusions drawn from digital evidence can vary largely due to differences in their respective forensic systems, models, and terminology. This persistent incompatibility severely impacts the reliability of investigative findings as well as the credibility of the forensic analysts. Evidence reasoning is a fundamental part of investigative efficacy; however, the digital forensic process currently lacks the scientific rigor necessary to function in this capacity

I will also introduce a framework that will enable researchers and examiners to apply various reasoning models to their cases. The application of these reasoning methods would be automated in order to avoid discrepancies and provide reproducibility. This framework will handle the analysis phase of the digital forensic investigative process. It will receive information from both open and closed source digital forensic tools. This information will feed various visualizations to aid in the development of a hypothesis. The reasoning models define and assign likelihood between the relationships of evidence pertaining to the hypothesis. As digital forensic science advances it is important to be able to rigorously determine conclusions drawn from electronic evidence. The ability to determine if these conclusions are drawn is of critical importance.

CTU will post a recording of the live presentations on its website: https://capitol.instructure.com/courses/sis_course_id:CAE_Tech_Talk/external_tools/4

Announcements for CAE Tech Talk events can be found in the news and calendar section of the CAE community website: www.caecommunity.org


Singapore Cybersecurity R&D Conference: Call for Abstracts

Date/Time: January 14-15, 2016
Location: Location: Singapore University of Technology and Design, Singapore
Register: Details of submission can be found in the Conference website: http://itrust.sutd.edu.sg/sg-crc-2016/

Students Faculty

This is not an opportunity to be missed! Submit a technical paper in the research, industry, or tools track. Engage in conversations with the top researchers and practitioners from across the world in the area of cyber security. Visit the most advanced realistic testbeds in cyber physical systems and enjoy a game of attack and defence. And of course, enjoy the ever beautiful Singapore.

Students are strongly encouraged to participate and compete for many cash prizes.

Theme: Cyber Security by Design

The inaugural Singapore Cyber Security R&D Conference will be held in Singapore on January 14-15, 2016 at the campus of the Singapore University of Technology and Design (SUTD). The conference will bring together academics and practitioners from across the world to participate in a vibrant programme consisting of research papers, industrial best practices, and tools exhibition. Students, undergraduate and graduate, are encouraged to participate in specially organised sessions. Several cash awards and certificates will be given to the best contributions in various student categories.

This year’s theme focuses on the importance of bringing a technically grounded element of design that integrates cyber security into a system early in the process rather than an afterthought. The element of design is integral to a process be it a purely software system, such as one engaged in managing online transactions, or a combination of hardware and software, such as in Industrial Control Systems, pacemakers, and a multitude of IoT devices. This design element pervades the entire development process from the beginning till the end, and even during operation and maintenance. SG-CRC 2016 will focus on how design as an element can be made explicit early in the development process using novel techniques based on sound mathematical tools and engineering approaches.

Submissions

Authors are invited to submit original work on any of the topics listed below. Submissions that fall in the general area of cyber security but not exactly in any of the topics below will also be considered. Submissions may focus on theoretical results, experiments, or a mix of both.

  • Attacker and attack models
  • Biometrics
  • Cyber Security Education
  • Data privacy
  • Defence against side channel attacks
  • Design of runtime security
  • Design of secure controllers
  • Design of secure systems from insecure components
  • Digital Forensics
  • Economic models of cyber security
  • EV/AV security
  • Formal methods in cyber security
  • Hardware/software cyber defense mechanisms
  • IoT security
  • Legal aspects of cyber security
  • Lightweight crypto and security
  • Methodologies for assessing system security and risk
  • Mobile security
  • Protection of public infrastructure: power, water, and transportation
  • Security by design
  • Security in healthcare
  • Security policies and compliance
  • Social Engineering and cyber security
  • Testbeds for experimentation
  • Testing for cyber security
  • Urban transportation system security
  • Verified security design

The Black T-Shirt Forensics Challenge

Date/Time: January 1, 2016 to April 1, 2016
Register: Registration for the annual challenge will be available on January 1, 2016.

Students

The Black T-Shirt Cyber Forensics Challenge is a free, annual contest, which has been designed to address a variety of elements important in conducting today's digital forensics examinations, incident responses, and intrusion analyses. This Challenge includes elements such as:

  • File system and operating system identification
  • Recovery of operating system and application artifacts
  • Recovery of user-created artifacts
  • Conducting in-depth analysis across the system and scenario, which extends beyond artifact recovery
  • Event reconstruction
  • Report writing

Each Challenge, designed by one or more of the Challenge's partners, will require participants to perform various activities of varying degrees of difficulty ranging from novice to expert.

In addition to the annual challenge, mini challenges will be offered starting in the fall.

For more information click here .


IEEE North Jersey Advanced Communications Symposium

Date/Time: Saturday, December 5, 2015 from 9:30 a.m. - 15:00 p.m.
Location: Stevens Institute of Technology, Hoboken, NJ
Register: Registration for this event is required. Please check the registration page for more information.
Cost: IEEE Member $10.00, Non-member $20.00, Student/graduate student/life member Free

Students Faculty

Sponsors
IEEE North Jersey Section
IEEE North Jersey Communications Society Chapter
IEEE North Jersey Computer Society Chapter
IEEE North Jersey/New York Information Theory Society Chapter
IEEE North Jersey Vehicular Technology Society Chapter
IEEE New Jersey Coast Communications Society Chapter
IEEE New Jersey Coast AP/VT/EMC Societies Joint Chapter
IEEE New Jersey Coast Computer Society Chapter
IEEE Princeton/Central Jersey Computer, Communication Society Chapter
IEEE Metropolitan Sections Activity Council

The 2015 IEEE North Jersey Advanced Communications Symposium (NJACS-2015) will be held at the Babbio Center, Stevens Institute of Technology, in Hoboken, NJ, on Saturday, December 5, 2015. The symposium consists of four keynote presentations and a parallel poster session. The symposium program will cover advanced topics in communications, including 5th generation wireless networks, massive MIMO, and Internet of things. The posters will be presented by graduate students and postdocs. Poster presentations will be on display all day and special dedicated exhibition times are scheduled for all attendees. There will be plenty of opportunities to interact with presenters and network with peers.

Symposium Program

09:30 - 10:00 Registration, Meet and Greet, Poster Set-Up

10:00 - 10:15 Opening Remarks

10:15 - 11:00 5G: What Can We Learn from the Previous Four Generations?
Dr. Henning Schulzrinne, Professor, Columbia University

11:00 - 11:45 Cell-Free Massive MIMO: Uniformly Great Service for Everyone
Dr. Alexei Ashikhmin, DMTS, Commun. and Stat. Research, Bell Labs, Alcatel-Lucent

11:45 - 13:00 Lunch and Poster Presentations

13:00 - 13:45 Millimeter Wave Networks: Challenges and Opportunities
Dr. Nazmul Islam, Senior Engineer, Qualcomm

13:45 - 14:30 Internet of Things: Advances and Applications
Dr. Kevin Lu, Adj. Professor, Stevens Inst. of Techn., former Chief Scientist, Telcordia

14:30 - 14:45 Poster Competition and Awards

14:45 - 15:00 Closing Remarks

For more information and registration, please check: http://sites.ieee.org/northjersey/events/2015-NJACS


Cloud, Storage, Big Data, and Security future in Financial Services

Date/Time: Time: 12:00PM, Wednesday, December 2, 2015, pre-meeting pizza starting at 11:45 AM.
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Contact: Hong Zhao (201)-692-2350, zhao@fdu.edu ; or Alfredo Tan, tan@fdu.edu

Students

By Motti Finkelstein, Managing Director, Citi

About the Speaker

Motti Finkelstein is the CTO – Americas Infrastructure and Global Strategy and Planning - Citi Architecture and Technology Engineering (CATE). The main focus of Strategy and Planning is a cohesive, secure, reliable, scalable, flexible, cost efficient solution approach across CitiUser, CitiData, CitiCloud, CitiApp, CitiServer, CitiStorage, CitiNetwork and CitiSecure as part of infrastructure Engineering. Previously Motti was headed Platforms & Storage Engineering, Applications Services, Architecture, Capacity Planning and Regional Engineering for Citi Technology Infrastructure North America, and Global Engineering and Architecture for Databases for CATE.

Prior to joining Citi, Motti served as the CIO at Versaware, an ePublishing company, and as a Director in the Department of Technology and Telecommunications of the City of NY. His responsibilities included multi-million dollar data center migrations and consolidations, Database Technologies, DR, Facilities, and Communications. Prior to that Motti was responsible for the IT Department in the computer unit of the Israeli Air Force.

Mr. Finkelstein holds a Bachelor of Technology & Applied Sciences in Computer Software Engineering. He also holds an M.B.A. in International Business from the Zicklin School of Business, Baruch College.

About the Talk

Financial Services companies are actually technology companies with significant amounts of data. We will explore what innovative solutions and strategies can do to enable financial services. The focus will be technology infrastructure solutions. The discussion will elaborate on the technology of clouds, big data, storage, and security.

Sponsors
IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering


IEEE North Jersey Advanced Communications Symposium Call for Posters

Date/Time: Last date for abstract submission: 11/20/2015 . Electronic version poster due: 11/30/2015 . Bring your hard copy poster to the symposium on 12/05/2015 .
Location: Babbio Center, StevensInstitute of Technology, Hoboken, NJ, December 5, 2015
Register: Register and submit your post abstract via the following link http://sites.ieee.org/northjersey/events/2015-njacs/posters/

The IEEE North Jersey Section and its Communications, Computer and Vehicular Technology Chapters are organizing an one‐day technical symposium covering wireless communication and related topics at the Babbio Center on Saturday, December 5, 2015. The event consists of invited presentations given by distinguished speakers as well as poster sessions by invited graduate students/postdocs. There will be plenty of opportunity to interact with presenters and network with peers at the coffee breaks, during the lunch and the closing reception.

The organizing committee is currently inviting graduate students to prepare a poster presentation on recent work, recent research results, and cutting edge developing technologies in communications and related fields. Masters students, PhD candidates, and post docs are encouraged to participate. The posters session will be particularly helpful for student researchers to have direct interactions with faculty, industry personnel and other peers. This will serve as an excellent platform and opportunity to network for future collaborative research and career advancement. Three outstanding posters will receive 2015 IEEE North Jersey Section Communications Poster Awards .

Award Prizes
First Place: $300
Second Place: $200
Third Place: $100
Co-authors shall share equally in the allocation of cash awards.


2015 National CyberWatch Center Webinars

Date/Time: All webinars are 30 minutes (except the one on Feb. 27th) and will begin at 11 a.m. ET.
Register: Register here !
Contact: For questions regarding trainings, contact Lynn Dohm at ldohm@nationalcyberwatch.org .

Students Faculty

Google Hangout Invitations will be sent to the email address you provide the day before the webinar. All webinars are 30 minutes (except the one on Feb. 27th) and will begin at 11 a.m. ET.

Don't delay, seats are limited!

The webinars are as follows:

Cyber Security Education Consortium (CSEC) Resources: February 27, 2015

Making Sense of Virtualization Degrees/Certificates/Certifications for Colleges/Universities: March 27, 2015

National Cyber League for the Classroom: April 24, 2015

National Centers of Academic Excellence in Information Assurance/Cyber Defense (CAE): Program Updates and Support: May 29, 2015

Q&A with Representatives from the Advanced Cyberforensics Education (ACE) Consortium: August 28, 2015

Q&A with Representatives from CyberWatch West: September 25, 2015

Content is King: National CyberWatch Center Curriculum Updates & What it Means for Your Institution: October 30, 2015

Stop.Think.Connect Program: November 20, 2015


Digital Forensics Special Interest Group (SIG)

Date/Time: Fall Semester 2015
Location: Cybercrime Training Lab 2, Second Floor of Dickinson Hall , Hackensack side of Metro Campus
Contact: Email doherty@fdu.edu for any questions

Students

This SIG meets on Monday evenings from 5:30 – 6:15 PM during the Fall Semester of 2015. The SIG is scheduled in the evening for the convenience of full or part time adult learner FDU students, but all FDU students, staff, and faculty are welcome. The SIG will help students learn about mobile device forensics. Equipment, tools, policy, and techniques will be demonstrated and/or discussed.

NOTE: There are no pre-requisites needed for this activity. There is also no cost and no credit given for attendance.

We will also be available for including FDU Vancouver by ITV (2:30 PM Pacific Time the same days)

Prof. Eamon P. Doherty Ph.D., SSCP, CPP, CCE

Week 1 – GPS Device Forensics: September 28

Week 2 – IPAD Forensics: October 5

Petrocelli Fall Recess – No School: October 12

Week 3 – Digital Camera Forensics: October 19

Week 4 – Pager Systems Forensics (3.5 million in use in USA, 2012): October 26

Week 5 – CCTV Intro: November 2

Week 6 – Intro to Logic Cube: November 9

Week 7 – Legacy Media Forensics (CF Cards, Jazz Disks, Zip Disks, 3.5,5.25” and 8 Inch Diskettes, XD Cards): November 16


Introduction to Legacy Device Forensics

Date/Time: Tuesday, November 3, 2015 - 9am - 12:15pm
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Cost: The cost is $50 for both FDU students and non FDU students -registration is best with a credit card to 201-692-6500. A certificate will be given to you at the end of class.

Students

Continuing Education
Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP, CISSP

Here is an opportunity to learn about the vocabulary and tools used in the field of flip top cell phone forensics, IDE Hard Drive Forensics, Pager Systems Forensics (3.5 million people in the U.S. had pagers in 2012), CD and Floppy Drive Forensics and why such investigative knowledge is important for both businesses and security professionals.

The course topics include both theory and practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the FAT File System, RecoverMyFiles, Logic Cube, Helix V1.7, ISO Buster for CDs, Project-A-Phone.

We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.


2015 National Initiative for Cybersecurity Education (NICE) Conference

Date/Time: November 3-4, 2015
Location: Paradise Point Resort & Spa
1404 Vacation Road, San Diego, CA 92109, United States
Register: Register Now

Faculty

NICE fosters and promotes an ecosystem of cybersecurity education, training, and workforce development that effectively secures cyberspace. The NICE 2015 Conference is a rallying point around cybersecurity education and workforce development providing a face-to-face convening of public-private partners, an opportunity to signal NICE strategic directions and priorities, and a forum to showcase best practices. Cybersecurity has emerged as one of the leading creators of jobs and opportunity for all economic sectors. The demand for cybersecurity positions in both the public and private sector is large and growing, but the talent pool of cybersecurity workers is not yet able to keep up.


RETR3AT 2015

Date/Time: October 31, 2015
Register: Register Now

Students Faculty

RETR3AT engages, educates, and raises awareness about cybersecurity through community outreach and technical presentations.

We foster a community of ethical cybersecurity professionals who convene annually in the beautiful mountains of Western North Carolina.

  • Breakfast, Lunch and Refreshments included.
  • Earn conference attendance credits toward your professional certifications such as CISM & CompTIA.
  • Door prizes: ASUS Chromebook, WiFi Pineapple Mark V, UE MegaBoom & more.

For more information click here .


National Cybersecurity Symposium: Bulding Law Enforcement and Financial Services Sector Partnerships

Date/Time: Thursday, October 22, 2015 from 8:30am - 12:00pm (registration will be available from 8:00am - 8:30am)
Location: Kean University’s STEM Building (1075 Morris Avenue, Union, NJ 07083). The STEM Building is located right next to URSINO Restaurant.
Register: Please RSVP to Theresa Kwon Theresa.Kwon@ic.fbi.gov .

Faculty

This event is an open house hosted by FBI, U.S. Secret Service (USSS), and the Department of the Treasury and sponsored by the Financial Services Sector Coordinating Council (FSSCC), the financial services sector’s coordinator for the protection of critical financial infrastructure.

The purpose of this event is to enhance collaboration between financial services sector institutions and federal law enforcement entities on cybersecurity. Session attendees will gain further insight into the capabilities within both the FBI and USSS, a better understanding of cybersecurity threats, and information about how to incorporate collaboration with law enforcement into internal incident response plans. Collaborating with law enforcement in the event of an incident, as well as contacting the relevant financial regulatory agencies, can enhance an institution's ability to contain, mitigate, and recover from cyber incidents.

Space for this event is limited, so please register early. Organizations will be treated on a first come, first served basis. Individual slots per organization may be limited to allow for the largest number of organizations to participate. A request for registration does not guarantee participation.If you wish to attend this event, please RSVP to Theresa Kwon ( Theresa.Kwon@ic.fbi.gov ) and provide the following information by Thursday, October 15th, 2015. - Name - Organization - Title - Email Address - Office Phone - Mobile Phone


Clarifying Fog Networking

Date/Time: 12:30PM, Thursday, October 22, 2015, pre-meeting pizza starting at 12:15 PM.
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666, http://www.fdu.edu/visitorcenter/directions/teaneck_map.html.
Contact: For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu ; or Alfredo Tan, tan@fdu.edu .

Students

About the Speaker

Dr. Mung Chiang is the Arthur LeGrand Doty Professor of Electrical Engineering at Princeton University and the recipient of the 2013 Alan T. Waterman Award. He created the Princeton EDGE Lab in 2009 to bridge the theory-practice divide in networking by spanning from proofs to prototypes, resulting in a few technology transfers to industry, several startup companies and the 2012 IEEE Kiyo Tomiyasu Award. He serves as the inaugural Chairman of Princeton Entrepreneurship Council and the Director of Keller Center for Innovation in Engineering Education at Princeton. His Massive Open Online Courses on networking reached over 250,000 students since 2012 and the textbook received the 2013 Terman Award from American Society of Engineering Education. He was named a Guggenheim Fellow in 2014.

About the Talk

Pushing computation, control and storage into the “cloud” has been a key trend in networking in the past decade. The cloud is now “descending” to the network edge and often diffused among the client devices. The cloud is becoming the “fog.” Fog Network presents an architecture that uses one or a collaborative multitude of end-user clients or near-user edge devices to carry out storage, communication, computation, and control in a network. This talk will survey such an architecture that will support the Internet of Things, heterogeneous 5G mobile services, and home and personal area networks, and explore how fog networks may incorporate the latest advances in devices, network systems, and data science to reshape the “balance of power” in the ecosystem of computing and networking.

All are welcome!

You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 12:15 P.M.

Sponsors
IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering


An Introduction and Demonstration to Cloud Computing

Date/Time: October 21, 2015 6:00-7:00pm free pre-meeting buffet/networking, 7-8:15pm Seminar and Q&A
Location: Muscarelle Room 105, Fairleigh Dickinson University Metropolitan Campus (Teaneck)
Register: Attendees must registrater: https://meetings.vtools.ieee.org/m/35688
Contact: For more information contact Amit Patel, a.j.patel@ieee.org (ComSoc) or Hong Zhao, zhao@fdu.edu (Computer), Alfredo Tan, tan@fdu.edu (Signal Proc).

Students

About the Speaker

Peter DePasquale has newly joined Sailthru as a Senior Engineer in their Manhattan headquarters. Prior to joining Sailthru, Pete was an Associate Professor of Computer Science at The College of New Jersey. He holds a Ph.D. and Masters in Computer Science from Virginia Tech and a Masters and Bachelors in Computer Science from Villanova University. His areas of research interest included cloud computing, computer science education, and web application development. He is the author of two programming language reference guides and co-author of two introductory programming textbooks.

About the Talk

Cloud computing is among the hottest buzzwords in technology today, and holds great promise for how products and services are offered to the world via the Internet. This talk will provide an introduction, background and demo to cloud computing and its terminology, as well as provide an overview of Amazon.com's offerings in the cloud space. Learn how you can start to leverage the cloud for your personal computing as well as for corporate/professional computing needs.

Would you like to apply Amazon's cloud for your development needs in e-commerce, storage, web hosting, databases, email, and more? We'll introduce and demo such popular services like S3 (Simple Storage Service), SES (Simple Email Service), SNS (Simple Notification Service), and EC2 (Elastic Compute Cloud [virtual UNIX and Windows machines]). Time permitting, we'll overview other key services and newer offerings like Access Control, Search, Machine Learning, Application Deployment and more!) If you are looking for an introduction to cloud computing, wish to migrate your infrastructure off site, or want to develop using cloud resources, this talk is for you!

Check https://meetings.vtools.ieee.org/m/35688 for latest updates.

Free Parking available and directions to campus can be found at: http://view2.fdu.edu/campuses-and-
centers/metropolitan-campus/campus-index-and-maps/directions-to-metropolitan-campus/.

Sponsors
IEEE Communications Society North Jersey Chapter
IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering


Cell Phone Forensics Continuing Education

Date/Time: Tuesday - October 20, 2015 - 9am - 12pm
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Cost: The cost is $50 which also includes the $10 registration. It is best to register with a credit card to 201-692-6500 and a certificate will be mailed to you later.

Students

Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP, CISSP

The course topics include either theory or practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the RCFL, The IACIS, I will demonstrate how to map the coordinates of a digital picture with embedded GPS Data

We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.


CAE Tech Talk: Introduction to Reverse Enginering x86 and The Age of Drones and Cybersecurity

Date/Time: October 15, 2015 1:00-3:15pm EST
Location: https://capitol.adobeconnect.com/cae_tech_talk/
login as Guest and enter your name. No password required.
Contact: For questions on CAE Tech Talk events, please send email to CAETechTalk@nsa.gov

Students

Mark your calendars and come join your friends in the CAE community for a Tech Talk presentation. We are a warm group that shares our technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentation(s) using their online delivery platform (Adobe Connect). The presentation along with questions and answers is conducted live in real-time using VOIP and chat. Just log in as guest and enjoy the presentation(s).

Below is a description of the presentation(s) and the logistics of attendance:

Introduction to Reverse Engineering x86

Time: 1-2pm EST
Presenter: Professor Matt Miller (University of Nebraska at Kearney)
Audience Skill Level: Intermediate and Advanced

Malware and cyber-attacks are an all too common occurrence in today’s digital world. Reverse engineering is the process of taking a system apart and figuring out how it works. Cybersecurity analysts use reverse engineering to determine the functionality of malware. When the functionality is determined, analysts can use that information when responding to the malware infection. Other uses of reverse engineering include determining functionality of programs whose source code has been lost, development of low level software defenses, and the development of offensive software exploits. This talk will demonstrate the process of reverse engineering and show some of the techniques that compilers use when generating executable programs.

The Age of Drones and Cybersecurity

Time: 2:15-3:15pm
Presenter: Professor Vincent Nestler (Capitol Technology University)
Audience Skill Level: All levels

The age of drones is upon us. Drones and drone technology will be used in almost all aspects of our lives by almost every organization and industry. This talk will discuss some of the challenges that we will face and what we can do to prepare for it.

After the live presentation(s), CTU will post a recording of the presentation(s) on its website: https://capitol.instructure.com/courses/sis_course_id:CAE_Tech_Talk/external_tools/4

Announcements for CAE Tech Talk events can be found in the news and calendar section of the CAE community website: www.caecommunity.org


IEEE Xtreme Programming Competition

Date/Time: Competition on October 24, 2015; Registration will close on October 12, 2015 00:00:00 UTC.
Location: No travel required, just brain power, stamina and your favorite energy drink.
Register: Register your team now.
Contact: Students at FDU should compete through the IEEE student club, reach out to Dr. Mondal mondal@fdu.edu

Students

What could you win?

  • Fame: Competing in the world's most 'Xtreme' programming contest is a big deal participating means you get unlimited bragging rights.
  • Fortune:
  • Grand prize is a trip to the IEEE conference of your choice, anywhere in the world.
  • Second place team members each receive an iPad Air®.
  • Third place team members each receive an iPad mini®.
  • Fourth - Tenth place team members each receive a Raspberry Pi computer.
  • Top 100 place team members will receive an Xtreme merchandise bundle and special software gifts from competition partners.
  • Opportunity: Past IEEEXtreme winners have had great success in leveraging their competition performance in their career growth.

Visit the IEEEXtreme website for complete contest rules and prize information.


FDU 3rd Annual Symposium: Law Enforcement and Cyber Defense

Date/Time: Wednesday, September 30, 2015 from 8:00 AM to 3:45 PM
Location: Mansion, Lenfell Hall, Florham Campus, Fairleigh Dickinson University, 175 Park Avenue, Florham Park, NJ 07932
Register: Register on eventbrite here .
Contact: If you have any questions, please contact Kim Diccianni or Christine Bravo in the Grants and Sponsored Projects office at 201-692-2105.

Students

Fairleigh Dickinson University’s Center for Cybersecurity and Information Assurance (CCIA) is pleased to announce its 3rd Annual Symposium on Law Enforcement and Cyber Defense to be held on Wednesday, September 30, 2015 in Lenfell Hall, The Mansion of the Florham Campus. This year’s theme is Law Enforcement and Cyber Defense indicating how government authorities and the private sector partner to prevent, detect, and mitigate cyber threats and crimes. The forum will feature distinguished speakers offering their perspectives on security threats, business continuity, and forensics from local law enforcement authorities to national level and beyond. Our Keynote Speaker, Sherrill Nicely, Deputy Chief Information Officer, Central Intelligence Agency will share her extensive experience in information security, and ideas on the important roles security personnel, private citizens and academics need to play to avoid major cyber disasters. Attendees will predominantly include government, law enforcement, and academic representatives, and is open to the public.

For more information, visit the eventbrite here .


CISSE Spring 2016 Call For Papers

Date/Time: No later than December 30, 2015
Location: Philadelphia
Register: Please submit your Academic Paper to askCISSE@cisse.info following the CISSE Publication Policies that can be found at: www.cisse.info/resources
Cost: Early Bird Registration opens January 1, 2016

Faculty

Back by popular demand a “Special Edition” of the CISSE Journal, which will be offered in both digital and paperback versions on Amazon.com this Spring.

The publication Title: Special Edition of the Colloquium for Information Systems Education: Innovative Classroom Approaches for Cyber Security Education, Edition 3, Issue 2

Special consideration will be given to papers earlier submitted but re-directed to our "Round Table" sessions in June.

Your submission will be double blind reviewed and our editorial staff will contact you if we are considering publishing your paper for the Special Edition by January 30, 2015.
Submissions must be in "Word" and must be anonymized to allow for double-blind reviewing. Authors are expected to make a good faith effort to anonymize their submissions and should not identify themselves either explicitly or by implication (e.g., through references or acknowledgments). Submissions violating formatting or anonymization instructions will be returned without review.

Papers on original unpublished results may be at most 10 pages in length (single-column, single-spacing, at least 11 point font, with reasonable margins, including figures, tables, and references). Accepted papers will be published in the Spring Special Edition and it will require the authors to work with the Editorial staff to make any necessary changes and to be formatted as a word document for a 6 x 9 inch page with .5 inch margins. All digitized images submitted with the final revision of the manuscript must be of high quality and have resolutions of at least 300 d.p.i. for color, 600 d.p.i. for greyscale and 1,200 d.p.i. for line art.

CISSE will continue to have Academic Paper presentation sessions in Philadelphia, and publish those papers in Edition 4, Issue 1 in the fall of 2016. Stay tuned for that announcement later this year.


Digital Forensic for Handheld Devices

Date/Time: September 10, 2015 from 3:00pm - 5:00pm
Location: 842 Cambie Street, Vancouver, BC (in Yaletown, Near corner of Robson and Cambie) Room 130, Fairleigh Dickinson University
Register: Open by Invitation. Reservations recommended by contacting Neil Mort at nmort@fdu.edu or 604-648-4464.

Students

Eamon is the Cybercrime Training Lab Director as well as a Full Professor in Petrocelli College of Continuing Studies at Fairleigh Dickinson University (FDU). Dr. Doherty also earned a Certificate in PDA Forensics, a Certificate in Computer Security and Forensic Administration, and is a Certified Computer Examiner (CCE), and the author of books on digital forensics.

Cell Phone Forensics

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the RCFL, The IACIS, I will demonstrate how to map the coordinates of a digital picture with embedded GPS Data and to easily create a directed graph of the suspect’s phone and all the people who called or were called and the numbers of calls made or received.

We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.

Light refreshments will be provided.


NICE 2015 Call for Proposals

Date/Time: Proposals will be accepted through September 9, 2015
Location: Paradise Point Conference Center, San Diego, California

Faculty

Event organizer NICE365 has opened up its Call for Proposals for NICE 2015, the 6th Annual National Initiative for Cybersecurity Education Conference, taking place in San Diego, California on November 3-4, 2015.

NICE fosters and promotes an ecosystem of cybersecurity education, training, and workforce development that effectively secures cyberspace. The NICE 2015 Conference is a rallying point around cybersecurity education and workforce development providing a face-to-face convening of public-private partners, an opportunity to signal NICE strategic directions and priorities, and a forum to showcase best practices.

The NICE 2015 Program Committee seeks your participation as a presenter or panelist for one of the 45-minute sessions in this powerful three-track conference. NICE 2015 offers unparalleled opportunities to demonstrate how your programs, ideas, technologies and processes support the continuing development of tomorrow's cybersecurity leaders. Today's efforts will drive business and job growth, provide opportunity, as well as provide enhanced security for our nation. Share your knowledge and experience by submitting a proposal.

Participants from academia, industry, and government (Federal, State, local, and tribal) are encouraged to address the following strategic cybersecurity education and workforce topics:

Track 1: Accelerate Learning and Skills Development

Track 2: Establish a Diverse Learning Community

Track 3: Workforce Development and Career Planning

Proposals will be accepted through September 9, 2015, and should be submitted by selecting "Submit Abstract" on the Call for Proposals page of NICE 2015.

For more information about NICE 2015, click here .


2015 Train-the-Trainer Workshops

Register: CLICK HERE to CHECK out the OFFERINGS!
Contact: For questions regarding trainings, contact Lynn Dohm at ldohm@nationalcyberwatch.org .

Faculty

National CyberWatch Center and the National Resource Center for Systems Security and Information Assurance are pleased to announce the spring/summer training schedule.

CISSP, Netlabs User Community Workshop, SCADA and many more!

Don't delay, seats are limited!

For more information, click here

Cyber Quests Webinar Distance Learning, Various Cities

(ISC)²® CISSP® Course Distance Learning, Various Cities

ISACA Cybersecurity Fundamentals Certificate Distance Learning, Various Cities

The Art of Penetration Testing - Teaching Ethical Hacking College of Southern Nevada, North Las Vegas, NV

The Internet of Things ~ Network Security is Everything! College of Southern Nevada, North Las Vegas, NV

Using Cybersecurity Related Websites in the Classroom College of Southern Nevada, North Las Vegas, NV

Netlabs+ User Community Workshop Distance Learning, Various Cities

CSSIA 2015 Version of Security+ Distance Learning, Various Cities

SCADA Distance Learning, Various Cities

Netlabs+ User Community Workshop Distance Learning, Various Cities

(ISC)²® CISSP® Course Distance Learning, Various Cities

(ISC)²® SSCP® Course Distance Learning, Various Cities


Codebreaker Challenge 3.0

Date/Time: September 1, 2015 at Midnight until December 31, 2015
Register: Register with your student email at https://codebreaker.ltsnet.net/

Students

The NSA plans to launch the 3rd annual Codebreaker Challenge this Fall in a competition to see which university can be the first to solve the challenge, and which can have the most solutions submitted. This will provide your students with an excellent hands-on opportunity to develop their reverse-engineering / low-level code analysis skills while working on a realistic problem set. Feedback from previous competitions indicated that students got a lot out of it, so with your help we would like to encourage as much participation as possible! Here are the pertinent details:

  • The challenge materials and instructions will be hosted at https://codebreaker.ltsnet.net/.
  • The challenge will begin on Sept. 1st at midnight, and will end on Dec. 31st.
  • Prizes will be awarded to the first 50 students that complete the challenge nation-wide. In the past, some universities have also chosen to offer additional incentives (extra-credit in a course, an award for the first students to solve the challenge within a department, etc.). We encourage you to do this as well if possible.
  • Students should register for the site using their .edu email addresses.
  • Links to reverse engineering lectures and other learning materials can be found on the site.

A virtual tech talk has been scheduled for September 17th from 2:00 to 3:00 PM EST in which we will introduce the challenge, present some reverse engineering techniques, and walk through the solution to the challenge from last year. We can also answer questions that students may have about the challenge at that time. More details regarding how to connect in to this event will be sent out through the CAE Tech Talk email distribution list in the coming weeks.


Cyber Security Conferences 2015

Date/Time: August 13, 2015 from 8:00am - 1:00pm
Location: Ramapo College, Mahwah, NJ
Register: On Eventbrite

Students Faculty

Is it any wonder why Cyber Crime is on the rise and the major target is small and medium sized business? These businesses are targeted by cyber criminals because they are the most vulnerable and exposed, making it an easy target. Given the increased pace and complexity of the threats, these businesses must adopt and adapt the appropriate approaches to cybersecurity that will require increased engagement to protect critical business assests without constraining innovation and growth.

On behalf of the America’s SBDC of New Jersey, we are producing this conference. We have hand selected these professional speakers, who have deep experience related to these matters, to educate the business community how to avoid, manage and handle the cyber-risk. We are seeking to collaborate with your organization to promote this event among your membership.

More information can be found at www.bergencyber.weebly.com

The America’s Small Business Development Centers (SBDC) of New Jersey presents Cyber Security Conferences 2015 to be held at Ramapo College of New Jersey, Mahwah, NJ on August 13, 2015, 8am – 1pm. The event is produced by Centaur Strategies, LLC, hosted by The Small Business Development Center of Bergen County, The Small Business Administration, Ramapo College of New Jersey and other stakeholders.