Past Events

CISSE Spring 2016 Call For Papers

Date/Time: No later than December 30, 2015
Location: Philadelphia
Host: CISSE
Register:
Please submit your Academic Paper to askCISSE@cisse.info following the CISSE Publication Policies that can be found at: www.cisse.info/resources
Cost: Early Bird Registration opens January 1, 2016

Back by popular demand a “Special Edition” of the CISSE Journal, which will be offered in both digital and paperback versions on Amazon.com this Spring.

The publication Title: Special Edition of the Colloquium for Information Systems Education: Innovative Classroom Approaches for Cyber Security Education, Edition 3, Issue 2

Special consideration will be given to papers earlier submitted but re-directed to our "Round Table" sessions in June.

Your submission will be double blind reviewed and our editorial staff will contact you if we are considering publishing your paper for the Special Edition by January 30, 2015. Submissions must be in "Word" and must be anonymized to allow for double-blind reviewing. Authors are expected to make a good faith effort to anonymize their submissions and should not identify themselves either explicitly or by implication (e.g., through references or acknowledgments). Submissions violating formatting or anonymization instructions will be returned without review.

Papers on original unpublished results may be at most 10 pages in length (single-column, single-spacing, at least 11 point font, with reasonable margins, including figures, tables, and references). Accepted papers will be published in the Spring Special Edition and it will require the authors to work with the Editorial staff to make any necessary changes and to be formatted as a word document for a 6 x 9 inch page with .5 inch margins. All digitized images submitted with the final revision of the manuscript must be of high quality and have resolutions of at least 300 d.p.i. for color, 600 d.p.i. for greyscale and 1,200 d.p.i. for line art.

CISSE will continue to have Academic Paper presentation sessions in Philadelphia, and publish those papers in Edition 4, Issue 1 in the fall of 2016. Stay tuned for that announcement later this year.


 

IEEE North Jersey Advanced Communications Symposium

Date/Time: Saturday, December 5, 2015 from 9:30 a.m. - 15:00 p.m.
Location: Stevens Institute of Technology, Hoboken, NJ
Host:
IEEE North Jersey Section
IEEE North Jersey Communications Society Chapter
IEEE North Jersey Computer Society Chapter
IEEE North Jersey/New York Information Theory Society Chapter
IEEE North Jersey Vehicular Technology Society Chapter
IEEE New Jersey Coast Communications Society Chapter
IEEE New Jersey Coast AP/VT/EMC Societies Joint Chapter
IEEE New Jersey Coast Computer Society Chapter
IEEE Princeton/Central Jersey Computer, Communication Society Chapter
IEEE Metropolitan Sections Activity Council
Register: Registration for this event is required. Please check the registration page for more information.
Cost:

IEEE Member

$10.00

Non-member

$20.00

Student/graduate student/life member

Free

 

The 2015 IEEE North Jersey Advanced Communications Symposium (NJACS-2015) will be held at the Babbio Center, Stevens Institute of Technology, in Hoboken, NJ, on Saturday, December 5, 2015. The symposium consists of four keynote presentations and a parallel poster session. The symposium program will cover advanced topics in communications, including 5th generation wireless networks, massive MIMO, and Internet of things. The posters will be presented by graduate students and postdocs. Poster presentations will be on display all day and special dedicated exhibition times are scheduled for all attendees. There will be plenty of opportunities to interact with presenters and network with peers.

Symposium Program

09:30 - 10:00 Registration, Meet and Greet, Poster Set-Up

10:00 - 10:15 Opening Remarks

10:15 - 11:00 5G: What Can We Learn from the Previous Four Generations?
Dr. Henning Schulzrinne, Professor, Columbia University

11:00 - 11:45 Cell-Free Massive MIMO: Uniformly Great Service for Everyone
Dr. Alexei Ashikhmin, DMTS, Commun. and Stat. Research, Bell Labs, Alcatel-Lucent

11:45 - 13:00 Lunch and Poster Presentations

13:00 - 13:45 Millimeter Wave Networks: Challenges and Opportunities
Dr. Nazmul Islam, Senior Engineer, Qualcomm

13:45 - 14:30 Internet of Things: Advances and Applications
Dr. Kevin Lu, Adj. Professor, Stevens Inst. of Techn., former Chief Scientist, Telcordia

14:30 - 14:45 Poster Competition and Awards

14:45 - 15:00 Closing Remarks

For more information and registration, please check: http://sites.ieee.org/northjersey/events/2015-NJACS


 

Cloud, Storage, Big Data, and Security future in Financial Services

Date/Time: Time: 12:00PM, Wednesday, December 2, 2015, pre-meeting pizza starting at 11:45 AM.
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Host:
IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering
Contact: Hong Zhao (201)-692-2350, zhao@fdu.edu; or Alfredo Tan, tan@fdu.edu

By Motti Finkelstein, Managing Director, Citi

About the Speaker

Motti Finkelstein is the CTO – Americas Infrastructure and Global Strategy and Planning - Citi Architecture and Technology Engineering (CATE). The main focus of Strategy and Planning is a cohesive, secure, reliable, scalable, flexible, cost efficient solution approach across CitiUser, CitiData, CitiCloud, CitiApp, CitiServer, CitiStorage, CitiNetwork and CitiSecure as part of infrastructure Engineering. Previously Motti was headed Platforms & Storage Engineering, Applications Services, Architecture, Capacity Planning and Regional Engineering for Citi Technology Infrastructure North America, and Global Engineering and Architecture for Databases for CATE.

Prior to joining Citi, Motti served as the CIO at Versaware, an ePublishing company, and as a Director in the Department of Technology and Telecommunications of the City of NY. His responsibilities included multi-million dollar data center migrations and consolidations, Database Technologies, DR, Facilities, and Communications. Prior to that Motti was responsible for the IT Department in the computer unit of the Israeli Air Force.

Mr. Finkelstein holds a Bachelor of Technology & Applied Sciences in Computer Software Engineering. He also holds an M.B.A. in International Business from the Zicklin School of Business, Baruch College.

About the Talk

Financial Services companies are actually technology companies with significant amounts of data. We will explore what innovative solutions and strategies can do to enable financial services. The focus will be technology infrastructure solutions. The discussion will elaborate on the technology of clouds, big data, storage, and security.


 

IEEE North Jersey Advanced Communications Symposium Call for Posters

Date/Time: Last date for abstract submission: 11/20/2015. Electronic version poster due: 11/30/2015. Bring your hard copy poster to the symposium on 12/05/2015.
Location: Babbio Center, StevensInstitute of Technology, Hoboken, NJ, December 5, 2015
Register: Register and submit your post abstract via the following link http://sites.ieee.org/northjersey/events/2015-njacs/posters/

The IEEE North Jersey Section and its Communications, Computer and Vehicular Technology Chapters are organizing an one‐day technical symposium covering wireless communication and related topics at the Babbio Center on Saturday, December 5, 2015. The event consists of invited presentations given by distinguished speakers as well as poster sessions by invited graduate students/postdocs. There will be plenty of opportunity to interact with presenters and network with peers at the coffee breaks, during the lunch and the closing reception.

The organizing committee is currently inviting graduate students to prepare a poster presentation on recent work, recent research results, and cutting edge developing technologies in communications and related fields. Masters students, PhD candidates, and post docs are encouraged to participate. The posters session will be particularly helpful for student researchers to have direct interactions with faculty, industry personnel and other peers. This will serve as an excellent platform and opportunity to network for future collaborative research and career advancement. Three outstanding posters will receive 2015 IEEE North Jersey Section Communications Poster Awards.

Award Prizes
First Place: $300
Second Place: $200
Third Place: $100
Co-authors shall share equally in the allocation of cash awards.


 

2015 National Initiative for Cybersecurity Education (NICE) Conference

Date/Time: November 3-4, 2015
Location: Paradise Point Resort & Spa 1404 Vacation Road, San Diego, CA 92109, United States
Register:Register Now

NICE fosters and promotes an ecosystem of cybersecurity education, training, and workforce development that effectively secures cyberspace. The NICE 2015 Conference is a rallying point around cybersecurity education and workforce development providing a face-to-face convening of public-private partners, an opportunity to signal NICE strategic directions and priorities, and a forum to showcase best practices. Cybersecurity has emerged as one of the leading creators of jobs and opportunity for all economic sectors. The demand for cybersecurity positions in both the public and private sector is large and growing, but the talent pool of cybersecurity workers is not yet able to keep up.


 

Introduction to Legacy Device Forensics

Date/Time: Tuesday, November 3, 2015 - 9am - 12:15pm
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Cost: The cost is $50 for both FDU students and non FDU students -registration is best with a credit card to 201-692-6500. A certificate will be given to you at the end of class.

Continuing Education
Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP, CISSP

Here is an opportunity to learn about the vocabulary and tools used in the field of flip top cell phone forensics, IDE Hard Drive Forensics, Pager Systems Forensics (3.5 million people in the U.S. had pagers in 2012), CD and Floppy Drive Forensics and why such investigative knowledge is important for both businesses and security professionals.

The course topics include both theory and practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the FAT File System, RecoverMyFiles, Logic Cube, Helix V1.7, ISO Buster for CDs, Project-A-Phone.

We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.


 

RETR3AT 2015

Date/Time: October 31, 2015
Register:Register Now

RETR3AT engages, educates, and raises awareness about cybersecurity through community outreach and technical presentations.

We foster a community of ethical cybersecurity professionals who convene annually in the beautiful mountains of Western North Carolina.

  • Breakfast, Lunch and Refreshments included.
  • Earn conference attendance credits toward your professional certifications such as CISM & CompTIA.
  • Door prizes: ASUS Chromebook, WiFi Pineapple Mark V, UE MegaBoom & more.

For more information click here.


 

Clarifying Fog Networking

Date/Time: 12:30PM, Thursday, October 22, 2015, pre-meeting pizza starting at 12:15 PM.
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666, http://www.fdu.edu/visitorcenter/directions/teaneck_map.html.
Host:
IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering
Contact: For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu; or Alfredo Tan, tan@fdu.edu.

About the Speaker

Dr. Mung Chiang is the Arthur LeGrand Doty Professor of Electrical Engineering at Princeton University and the recipient of the 2013 Alan T. Waterman Award. He created the Princeton EDGE Lab in 2009 to bridge the theory-practice divide in networking by spanning from proofs to prototypes, resulting in a few technology transfers to industry, several startup companies and the 2012 IEEE Kiyo Tomiyasu Award. He serves as the inaugural Chairman of Princeton Entrepreneurship Council and the Director of Keller Center for Innovation in Engineering Education at Princeton. His Massive Open Online Courses on networking reached over 250,000 students since 2012 and the textbook received the 2013 Terman Award from American Society of Engineering Education. He was named a Guggenheim Fellow in 2014.

About the Talk

Pushing computation, control and storage into the “cloud” has been a key trend in networking in the past decade. The cloud is now “descending” to the network edge and often diffused among the client devices. The cloud is becoming the “fog.” Fog Network presents an architecture that uses one or a collaborative multitude of end-user clients or near-user edge devices to carry out storage, communication, computation, and control in a network. This talk will survey such an architecture that will support the Internet of Things, heterogeneous 5G mobile services, and home and personal area networks, and explore how fog networks may incorporate the latest advances in devices, network systems, and data science to reshape the “balance of power” in the ecosystem of computing and networking.

All are welcome!

You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 12:15 P.M.


 

National Cybersecurity Symposium: Bulding Law Enforcement and Financial Services Sector Partnerships

Date/Time: Thursday, October 22, 2015 from 8:30am - 12:00pm (registration will be available from 8:00am - 8:30am)
Location: Kean University’s STEM Building (1075 Morris Avenue, Union, NJ 07083). The STEM Building is located right next to URSINO Restaurant.
Register: Space for this event is limited, so please register early. Organizations will be treated on a first come, first served basis. Individual slots per organization may be limited to allow for the largest number of organizations to participate. A request for registration does not guarantee participation.

If you wish to attend this event, please RSVP to Theresa Kwon (Theresa.Kwon@ic.fbi.gov) and provide the following information by Thursday, October 15th, 2015.

  • Name
  • Organization
  • Title
  • Email Address
  • Office Phone
  • Mobile Phone

This event is an open house hosted by FBI, U.S. Secret Service (USSS), and the Department of the Treasury and sponsored by the Financial Services Sector Coordinating Council (FSSCC), the financial services sector’s coordinator for the protection of critical financial infrastructure.

The purpose of this event is to enhance collaboration between financial services sector institutions and federal law enforcement entities on cybersecurity. Session attendees will gain further insight into the capabilities within both the FBI and USSS, a better understanding of cybersecurity threats, and information about how to incorporate collaboration with law enforcement into internal incident response plans. Collaborating with law enforcement in the event of an incident, as well as contacting the relevant financial regulatory agencies, can enhance an institution's ability to contain, mitigate, and recover from cyber incidents.


 

An Introduction and Demonstration to Cloud Computing

Date/Time: October 21, 2015 6:00-7:00pm free pre-meeting buffet/networking, 7-8:15pm Seminar and Q&A
Location: Muscarelle Room 105, Fairleigh Dickinson University Metropolitan Campus (Teaneck)
Host:
IEEE Communications Society North Jersey Chapter
IEEE Computer Society North Jersey Chapter
IEEE Signal Processing Society North Jersey Chapter
FDU Gildart Haase School of Computer Sciences and Engineering
Register: Attendees must registrater: https://meetings.vtools.ieee.org/m/35688
Contact: For more information contact Amit Patel, a.j.patel@ieee.org (ComSoc) or Hong Zhao, zhao@fdu.edu (Computer), Alfredo Tan, tan@fdu.edu (Signal Proc).

About the Speaker

Peter DePasquale has newly joined Sailthru as a Senior Engineer in their Manhattan headquarters. Prior to joining Sailthru, Pete was an Associate Professor of Computer Science at The College of New Jersey. He holds a Ph.D. and Masters in Computer Science from Virginia Tech and a Masters and Bachelors in Computer Science from Villanova University. His areas of research interest included cloud computing, computer science education, and web application development. He is the author of two programming language reference guides and co-author of two introductory programming textbooks.

About the Talk

Cloud computing is among the hottest buzzwords in technology today, and holds great promise for how products and services are offered to the world via the Internet. This talk will provide an introduction, background and demo to cloud computing and its terminology, as well as provide an overview of Amazon.com's offerings in the cloud space. Learn how you can start to leverage the cloud for your personal computing as well as for corporate/professional computing needs.

Would you like to apply Amazon's cloud for your development needs in e-commerce, storage, web hosting, databases, email, and more? We'll introduce and demo such popular services like S3 (Simple Storage Service), SES (Simple Email Service), SNS (Simple Notification Service), and EC2 (Elastic Compute Cloud [virtual UNIX and Windows machines]). Time permitting, we'll overview other key services and newer offerings like Access Control, Search, Machine Learning, Application Deployment and more!) If you are looking for an introduction to cloud computing, wish to migrate your infrastructure off site, or want to develop using cloud resources, this talk is for you!

Check https://meetings.vtools.ieee.org/m/35688 for latest updates.

Free Parking available and directions to campus can be found at: http://view2.fdu.edu/campuses-and- centers/metropolitan-campus/campus-index-and-maps/directions-to-metropolitan-campus/.


 

Cell Phone Forensics Continuing Education

Date/Time: Tuesday - October 20, 2015 - 9am - 12pm
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Cost: The cost is $50 which also includes the $10 registration. It is best to register with a credit card to 201-692-6500 and a certificate will be mailed to you later.

Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP, CISSP

The course topics include either theory or practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the RCFL, The IACIS, I will demonstrate how to map the coordinates of a digital picture with embedded GPS Data

We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.


 

CAE Tech Talk: Introduction to Reverse Enginering x86 and The Age of Drones and Cybersecurity

Date/Time: October 15, 2015 1:00-3:15pm EST
Location:https://capitol.adobeconnect.com/cae_tech_talk/
login as Guest and enter your name. No password required.
Host: National Centers of Academic Excellence
Contact: For questions on CAE Tech Talk events, please send email to CAETechTalk@nsa.gov

Mark your calendars and come join your friends in the CAE community for a Tech Talk presentation. We are a warm group that shares our technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentation(s) using their online delivery platform (Adobe Connect). The presentation along with questions and answers is conducted live in real-time using VOIP and chat. Just log in as guest and enjoy the presentation(s).

Below is a description of the presentation(s) and the logistics of attendance:

Introduction to Reverse Engineering x86

Time: 1-2pm EST
Presenter: Professor Matt Miller (University of Nebraska at Kearney)
Audience Skill Level: Intermediate and Advanced

Malware and cyber-attacks are an all too common occurrence in today’s digital world. Reverse engineering is the process of taking a system apart and figuring out how it works. Cybersecurity analysts use reverse engineering to determine the functionality of malware. When the functionality is determined, analysts can use that information when responding to the malware infection. Other uses of reverse engineering include determining functionality of programs whose source code has been lost, development of low level software defenses, and the development of offensive software exploits. This talk will demonstrate the process of reverse engineering and show some of the techniques that compilers use when generating executable programs.

The Age of Drones and Cybersecurity

Time: 2:15-3:15pm
Presenter: Professor Vincent Nestler (Capitol Technology University)
Audience Skill Level: All levels

The age of drones is upon us. Drones and drone technology will be used in almost all aspects of our lives by almost every organization and industry. This talk will discuss some of the challenges that we will face and what we can do to prepare for it.

After the live presentation(s), CTU will post a recording of the presentation(s) on its website: https://capitol.instructure.com/courses/sis_course_id:CAE_Tech_Talk/external_tools/4

Announcements for CAE Tech Talk events can be found in the news and calendar section of the CAE community website: www.caecommunity.org


 

IEEE Xtreme Programming Competition

Date/Time: Competition on October 24, 2015; Registration will close on October 12, 2015 00:00:00 UTC.
Location: No travel required, just brain power, stamina and your favorite energy drink.
Register: Register your team now.
Contact: Students at FDU should compete through the IEEE student club, reach out to Dr. Mondal mondal@fdu.edu

What could you win?

  • Fame: Competing in the world's most 'Xtreme' programming contest is a big deal participating means you get unlimited bragging rights.
  • Fortune:
    • Grand prize is a trip to the IEEE conference of your choice, anywhere in the world.
    • Second place team members each receive an iPad Air®.
    • Third place team members each receive an iPad mini®.
    • Fourth - Tenth place team members each receive a Raspberry Pi computer.
    • Top 100 place team members will receive an Xtreme merchandise bundle and special software gifts from competition partners.
  • Opportunity: Past IEEEXtreme winners have had great success in leveraging their competition performance in their career growth.

Visit the IEEEXtreme website for complete contest rules and prize information.


 

FDU 3rd Annual Symposium: Law Enforcement and Cyber Defense

Date/Time: Wednesday, September 30, 2015 from 8:00 AM to 3:45 PM
Location: Mansion, Lenfell Hall, Florham Campus, Fairleigh Dickinson University, 175 Park Avenue, Florham Park, NJ 07932
Register: Register on eventbrite here.
Contact: If you have any questions, please contact Kim Diccianni or Christine Bravo in the Grants and Sponsored Projects office at 201-692-2105.

Fairleigh Dickinson University’s Center for Cybersecurity and Information Assurance (CCIA) is pleased to announce its 3rd Annual Symposium on Law Enforcement and Cyber Defense to be held on Wednesday, September 30, 2015 in Lenfell Hall, The Mansion of the Florham Campus. This year’s theme is Law Enforcement and Cyber Defense indicating how government authorities and the private sector partner to prevent, detect, and mitigate cyber threats and crimes. The forum will feature distinguished speakers offering their perspectives on security threats, business continuity, and forensics from local law enforcement authorities to national level and beyond. Our Keynote Speaker, Sherrill Nicely, Deputy Chief Information Officer, Central Intelligence Agency will share her extensive experience in information security, and ideas on the important roles security personnel, private citizens and academics need to play to avoid major cyber disasters. Attendees will predominantly include government, law enforcement, and academic representatives, and is open to the public.

For more information, visit the eventbrite here.


 

Digital Forensics Special Interest Group (SIG)

Date/Time: Fall Semester 2015
Location: Cybercrime Training Lab 2, Second Floor of Dickinson Hall , Hackensack side of Metro Campus
Contact: Email doherty@fdu.edu for any questions

This SIG meets on Monday evenings from 5:30 – 6:15 PM during the Fall Semester of 2015. The SIG is scheduled in the evening for the convenience of full or part time adult learner FDU students, but all FDU students, staff, and faculty are welcome. The SIG will help students learn about mobile device forensics. Equipment, tools, policy, and techniques will be demonstrated and/or discussed.

NOTE: There are no pre-requisites needed for this activity. There is also no cost and no credit given for attendance.

We will also be available for including FDU Vancouver by ITV (2:30 PM Pacific Time the same days)

Prof. Eamon P. Doherty Ph.D., SSCP, CPP, CCE

Week 1 – GPS Device Forensics : September 28

Week 2 – IPAD Forensics : October 5

Petrocelli Fall Recess – No School : October 12

Week 3 – Digital Camera Forensics : October 19

Week 4 – Pager Systems Forensics (3.5 million in use in USA, 2012) : October 26

Week 5 – CCTV Intro : November 2

Week 6 – Intro to Logic Cube : November 9

Week 7 – Legacy Media Forensics (CF Cards, Jazz Disks, Zip Disks, 3.5,5.25” and 8 Inch Diskettes, XD Cards) : November 16


 

Digital Forensic for Handheld Devices

Date/Time: September 10, 2015 from 3:00pm - 5:00pm
Location: 842 Cambie Street, Vancouver, BC (in Yaletown, Near corner of Robson and Cambie) Room 130, Fairleigh Dickinson University
Register: Open by Invitation. Reservations recommended by contacting Neil Mort at nmort@fdu.edu or 604-648-4464.

Eamon is the Cybercrime Training Lab Director as well as a Full Professor in Petrocelli College of Continuing Studies at Fairleigh Dickinson University (FDU). Dr. Doherty also earned a Certificate in PDA Forensics, a Certificate in Computer Security and Forensic Administration, and is a Certified Computer Examiner (CCE), and the author of books on digital forensics.

Cell Phone Forensics

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the RCFL, The IACIS, I will demonstrate how to map the coordinates of a digital picture with embedded GPS Data and to easily create a directed graph of the suspect’s phone and all the people who called or were called and the numbers of calls made or received.

We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.

Light refreshments will be provided.


 

NICE 2015 Call for Proposals

Date/Time: Proposals will be accepted through September 9, 2015
Location: Paradise Point Conference Center, San Diego, California
Host: NICE365
Register: To read more and SUBMIT your IDEAS, click here.

Event organizer NICE365 has opened up its Call for Proposals for NICE 2015, the 6th Annual National Initiative for Cybersecurity Education Conference, taking place in San Diego, California on November 3-4, 2015.

NICE fosters and promotes an ecosystem of cybersecurity education, training, and workforce development that effectively secures cyberspace. The NICE 2015 Conference is a rallying point around cybersecurity education and workforce development providing a face-to-face convening of public-private partners, an opportunity to signal NICE strategic directions and priorities, and a forum to showcase best practices.

The NICE 2015 Program Committee seeks your participation as a presenter or panelist for one of the 45-minute sessions in this powerful three-track conference. NICE 2015 offers unparalleled opportunities to demonstrate how your programs, ideas, technologies and processes support the continuing development of tomorrow's cybersecurity leaders. Today's efforts will drive business and job growth, provide opportunity, as well as provide enhanced security for our nation. Share your knowledge and experience by submitting a proposal.

Participants from academia, industry, and government (Federal, State, local, and tribal) are encouraged to address the following strategic cybersecurity education and workforce topics:

Track 1: Accelerate Learning and Skills Development

Track 2: Establish a Diverse Learning Community

Track 3: Workforce Development and Career Planning

Proposals will be accepted through September 9, 2015, and should be submitted by selecting "Submit Abstract" on the Call for Proposals page of NICE 2015.

For more information about NICE 2015, click here.


 

Codebreaker Challenge 3.0

Date/Time: September 1, 2015 at Midnight until December 31, 2015
Host: NSA
Register: Register with your student email at https://codebreaker.ltsnet.net/

The NSA plans to launch the 3rd annual Codebreaker Challenge this Fall in a competition to see which university can be the first to solve the challenge, and which can have the most solutions submitted. This will provide your students with an excellent hands-on opportunity to develop their reverse-engineering / low-level code analysis skills while working on a realistic problem set. Feedback from previous competitions indicated that students got a lot out of it, so with your help we would like to encourage as much participation as possible! Here are the pertinent details:

  • The challenge materials and instructions will be hosted at https://codebreaker.ltsnet.net/.
  • The challenge will begin on Sept. 1st at midnight, and will end on Dec. 31st.
  • Prizes will be awarded to the first 50 students that complete the challenge nation-wide. In the past, some universities have also chosen to offer additional incentives (extra-credit in a course, an award for the first students to solve the challenge within a department, etc.). We encourage you to do this as well if possible.
  • Students should register for the site using their .edu email addresses.
  • Links to reverse engineering lectures and other learning materials can be found on the site.

A virtual tech talk has been scheduled for September 17th from 2:00 to 3:00 PM EST in which we will introduce the challenge, present some reverse engineering techniques, and walk through the solution to the challenge from last year. We can also answer questions that students may have about the challenge at that time. More details regarding how to connect in to this event will be sent out through the CAE Tech Talk email distribution list in the coming weeks.


 

Cyber Security Conferences 2015

Date/Time: August 13, 2015 from 8:00am - 1:00pm
Location: Ramapo College, Mahwah, NJ
Register:On Eventbrite

Is it any wonder why Cyber Crime is on the rise and the major target is small and medium sized business? These businesses are targeted by cyber criminals because they are the most vulnerable and exposed, making it an easy target. Given the increased pace and complexity of the threats, these businesses must adopt and adapt the appropriate approaches to cybersecurity that will require increased engagement to protect critical business assests without constraining innovation and growth.

On behalf of the America’s SBDC of New Jersey, we are producing this conference. We have hand selected these professional speakers, who have deep experience related to these matters, to educate the business community how to avoid, manage and handle the cyber-risk. We are seeking to collaborate with your organization to promote this event among your membership.

More information can be found at www.bergencyber.weebly.com

The America’s Small Business Development Centers (SBDC) of New Jersey presents Cyber Security Conferences 2015 to be held at Ramapo College of New Jersey, Mahwah, NJ on August 13, 2015, 8am – 1pm. The event is produced by Centaur Strategies, LLC, hosted by The Small Business Development Center of Bergen County, The Small Business Administration, Ramapo College of New Jersey and other stakeholders.


 

Cybersecurity Hard Problems Workshop III

Date/Time: June 30 - July 1
Location: Griffiss Institute Rome, NY
Host: Cyber Research Institute
Register: If you would like to attend, register for the workshop via http://www.cyberri.org.
Contact: Contact Kathaleene Riolo at kriolo@cyberri.org with any questions.

The Cyber Research Institute (CRI) is sponsoring its third workshop on cybersecurity: Cybersecurity Hard Problems Workshop III. The purpose of this workshop is to exchange cybersecurity ideas across domains. Specifically, Workshop III, will address hard problems related to technology transition. Similar to the first two workshops, Workshop III will address priority problems for the State and Nation, however, the focus will not be on identifying priority research topics, but to address the question, “What are we going to DO about it?” The workshop will be hosted at the Griffiss Institute in Rome, NY. There is no fee for the workshop. The purpose of this workshop is to bring together distinguished researchers and domain experts for a three-day period to examine, discuss, and propose solutions to the most pressing issues in cybersecurity today. The workshop is sponsored by the Cyber Research Institute in cooperation with the Griffiss Institute, the Air Force Research Laboratory Information Institute, InfraGard, and CYBER NY Alliance.

At the two-day summer workshop, we envision Day 1 being a set of presentations by application domain specialists and SME’s from a variety of sectors (financial, healthcare, power, transportation, etc...). Also, Day 1 will feature a short breakout session to discuss solutions to hard problems and technology transition issues. At the end of Day 1, we will have short social hour and networking event. This should be a good venue for exchanging information and ideas. Day 2 will continue SME presentations.

We hope that you can join us for this important workshop. The workshop agenda will follow in the weeks to come.


 

The 19th Colloquium for Information Systems Security Education (CISSE)

Date/Time: June 15 - 17, 2015
Location: JW Marriott Resort & Spa, Las Vegas, Nevada
Register: To register, click here.
Contact: To contact someone about this event see this.

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information, is vital to the continuity and security of business. The Colloquium's goal is to work to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula.

For 18 years The Colloquium for Information Security Educators (CISSE) has supported Cyber Security educators, researchers and practitioners in their efforts to improve curricula and foster discussion of current & emerging trends.

For more information about the Colloquium: http://www.cisse.info/


 

Introduction to GPS Forensics

Date/Time: Wednesday - June 10, 2015 - 9am - Noon
Location: Cybercrime Training Lab 2 in Dickinson Hall on Fairleigh Dickinson University's Metropolitan Campus
Host: Fairleigh Dickinson University
Register: Please call FDU Continuing Education at 201-692-6500. You may register and pay for the course with a credit card and receive a certificate of completion after participating in the class. The course is limited to 16 students.
Cost: The cost is $50 which includes the $10 registration fee.
Contact: Professor Eamon P. Doherty Ph. D., CCE, CPP, SSCP, CISSP doherty@fdu.edu

This introductory non credit continuing education course consists of two elements. The first element is practical while the other element is theoretical. The theoretical element consists of the history of GPS and a discussion of other competing systems such as Glonass and the Beidou Navigation Satellite System 北斗卫星导航系统. We will also discuss relevant vocabulary such as routes, waypoints, trips, points of interest, and possible impairments to the accuracy of GPS data. The practical element consists of learning to use a write blocker, forensically imaging the GPS navigation device with FTK Imager or Helix, using GPS Babel to change file formats if necessary, and mapping the itinerary file using Google Maps.


 

SANS CyberTalent Fair

Date/Time: May 14, 2015 - 12:00PM to 6:00PM (EDT)
Host: SANS
Register: To learn more and to register, visit this link.

The SANS CyberTalent Fair (SCTF) is a two-day, innovative virtual meeting place (formerly called the National Cybersecurity Career Fair) for the top cybersecurity employers and jobseekers in the United States. For attendees, it is a unique opportunity to learn more about current opportunities in the cybersecurity community and interact on a one-on-one basis with leading employers in the field. Powered by SANS, job searching and networking with employers has never been easier.


 

Introduction to a FRED Station and Encase

Date/Time: May 11, 2015 - 9AM - 12:00PM
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Host: Fairleigh Dickinson University
Register: Registration is best with a credit card to 201-692-6500.
Cost: The cost for FDU students and others is $50.
Contact: Eamon P. Doherty doherty@fdu.edu

Continuing Education Opportunity
Introduction to a FRED Station and Encase
With Prof. Eamon P. Doherty CCE, CPP, SSCP, CISSP

The course topics include both theory and practical training in: Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence, metadata, forensic image, SD cards, hard drives, CDs, Guidance Software Encase, creating a report, write blocker, SAN Storage Area Network, The FRED Station hardware, powering it up

A certificate will be given to you at the end of class.


 

Big Data: Challenges and Opportunities to Network Design

Date/Time: April 30, 2015 - 2:00PM - 3:00PM
Location: 600 Mountain Ave, Murray Hill, New Jersey, United States 07974, Building: Bell Laboratories, Alcatel-Lucent Room Number: Room 6A-106 Click here for Map
Host: Bell Laboratories
Register: For more information, and to register click here

Dr. Kang Xi will give a presentation on Big Data: Challenges and Opportunities to Network Design at Bell Laboratories, Alcatel-Lucent, in Murray Hill, NJ.

Everyone is welcome to attend this meeting.

Please register in advance for this meeting using VTOOLS to provide the meeting organizers an accurate head count. You can change/cancel the registration if your plans change. The meeting will take place in Room 6A-106, which is located near the main entrance behind the Bell Labs Showcase exhibition area. It is not necessary to sign in to access this area.


 

IEEE Lunch and Learn: Coordinated Jamming and Communications

Date/Time: 12:00PM, Wednesday, April 22, 2015, pre-meeting pizza starting at 11:45 AM.
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Host: IEEE Signal Processing Society North Jersey Chapter
IEEE Computer Society North Jersey Chapter
Fairleigh Dickinson University Gildart Haase School of Computer Sciences and Engineering
Contact: For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu; or Alfredo Tan, tan@fdu.edu.

About the Speaker
Dr. Yu-Dong Yao has been with Stevens Institute of Technology, Hoboken, New Jersey, since 2000 and is currently a professor and department director of electrical and computer engineering. Previously, from 1989 to 2000, he worked for Carleton University, Ottawa, Spar Aerospace Ltd., Montreal, and Qualcomm Inc., San Diego. His research interests include wireless communications and cognitive radio. He also conducts research in electronic warfare and directed energy.

About the Talk
Simultaneously jamming enemy signals and serving communications needs of friendly forces pose a significant challenge in military and battlefield applications. While this can be a standard requirement for such application scenarios, IED attacks highlight such critical needs, as jamming is one of the effective methods to deter IED. Traditional electronic warfare or military communications research includes the designs of LPI/LPD communications waveforms, anti-jamming signal waveforms, and jamming techniques. Recent advances in information technologies introduce a new challenge which requires high-capacity communications due to the networking and multimedia features of information. The other new requirement of jamming/communications calls for integrated design or coordinated jamming and communications (CJamCom). This seminar presents technical issues and methods in CJamCom.

All are welcome!

You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 11:45 A.M.


 

Introduction to GPS Forensics

Date/Time: Monday - April 20, 2015 - 9 AM - Noon
Location: Cybercrime Training Lab 2 in Dickinson Hall on the Metro Campus of Fairleigh Dickinson University
Host: Fairleigh Dickinson University
Register: Please call FDU Continuing Education at 201-692-6500. You may register and pay for the course with a credit card and receive a certificate of completion after participating in the class. The course is limited to 16 students.
Cost: The cost is $50 which includes the $10 registration fee.
Contact: Please call FDU Continuing Education at 201-692-6500.

Overview: This introductory non credit continuing education course consists of two elements. The first element is practical while the other element is theoretical. The theoretical element consists of the history of GPS and a discussion of other competing systems such as Glonass and the Beidou Navigation Satellite System 北斗卫星导航系统. We will also discuss relevant vocabulary such as routes, waypoints, trips, points of interest, and possible impairments to the accuracy of GPS data. The practical element consists of learning to use a write blocker, forensically imaging the GPS navigation device with FTK Imager or Helix, using GPS Babel to change file formats if necessary, and mapping the itinerary file using Google Maps.


 

What's Next in Cyber Security and Big Data

Date/Time: April 17, 2015 - 1:00 PM - 3:00 PM
Location: St. Peter's University, The Mac Mahon Student Center - The North Room, 47 Glenwood Avenue, Jersey City, NJ
Host: NJTC
Register: For more information and to register click here.
Cost: Members - No Charge
Non-Members - No Charge
Students - No Charge

Presenting an array of research and development efforts from the region's universities and companies. The presentations will include product demonstrations, providing participants a glimpse of Cyber Security and Big Data products that are reinventing technology throughout the region. Presentations will be from:
Michael Fitzpatrick, Senior Director, Logical Design Solutions
Charles Foley, CEO, Watchful Software
Jerome Hill, Certified Information Systems Security Professional Instructor, NJIT
Dr. Sylvain Jaume, Director of Data Science, St. Peters University
Dr. Robert Mack, President, MaxxPhase, Inc.
Rita Gurevich, Founder, SPHERE Technologies
Dr. Walter Willinger, Chief Scientist, NIKSUN
The program is part of the Technology & Entrepreneurship Talent Network Industry Week, organized under the stewardship of New Jersey Institute of Technology and funded by the New Jersey Department of Labor and Workforce Development.


 

Tech Tour-NIKSUN

Date/Time: April 16, 2015 - 8:30 AM - 11:00 AM
Location: NIKSUN, 100 Nassau Park Blvd, Princeton, NJ 08540
Host: NJTC
Register: For more information and to register click here.
Cost: Members - No Charge
Non-Members - $25.00
Students - $5.00

NIKSUN is a leader in cybersecurity and network monitoring. With a focus on innovation the company has excelled with their approach to analyzing network traffic and recording of all data. Join us for a tour of the NIKSUN facility and departments as well as a Live Attack demonstration.


 

Cloud and Security: Telecom War Stories

Date/Time: April 15, 2015 - 5:00 pm - 7:00 pm
Location: Juniper Networks, 200 Somerset Corporate Blvd., Ste. 4001, Bridgewater, NJ 08807
Host: NJTC
Cost: Members - $25.00
Non-Members - $50.00
Students - $5.00

The real world can be a harsh and unforgiving place, even for seasoned experts. It’s full of uncertainty, variables and legacy environments that will not be denied their foibles and oddities. When things do not go as expected (or promised), the results can sap valuable resources and potentially disrupt “normal” operations. Every company, even those with a full spectrum of technology experts using best practices – hits a pothole now and then. Explore some of these issues and how companies in both the cloud and security sectors dealt with these potholes and "paved" over them on their road to success.

Moderator: Vijay Aluwalia, Director of IT, Verizon
Speakers include:

  • David J. Devejian, Esq., CIO / Sr. Vice President, Financial Services, Inc.
  • Ron Guida, Principal Consultant Cloud Services, Verizon
  • Vince Ryan, Sr. Manager, Cloud Business Solutions, Century Link Technology Solutions
  • Scott Schober, President/CEO, Berkeley Varitronics Systems, Inc.

There will also be two WorkGroups (Roundtables) in advance of the program. These include:

For more information about this event click here.


 

IEEE Lunch and Learn: Sensors and Sampling: A Homological Approach

Date/Time: 12:00 Noon, Friday, April 10, 2015; pre-meeting with free pizza starting at 11:40 A.M.
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Host: Fairleigh Dickinson University
Contact: For more information, please contact: Hong Zhao, zhao@fdu.edu, 201-692-2350 or Alfredo Tan, tan@fdu.edu

Abstract: In their seminal work on homological sensor networks, de Silva and Ghrist showed the surprising fact that its possible to certify the coverage of a coordinate free sensor network even with very minimal knowledge of the space to be covered. We give a new, simpler proof of the de Silva-Ghrist Topological Coverage Criterion that eliminates any assumptions about the smoothness of the boundary of the underlying space, allowing the results to be applied to much more general problems. The new proof factors the geometric, topological, and combinatorial aspects of this approach. This factoring reveals an interesting new connection between the topological coverage condition and the notion of weak feature size in geometric sampling theory. We then apply this connection to the problem of showing that for a given scale, if one knows the number of connected components and the distance to the boundary, one can also infer the higher betti numbers or provide strong evidence that more samples are needed. This is in contrast to previous work which merely assumed a good sample and gives no guarantees if the sampling condition is not met.

Biography: Don Sheehy received his B.S.E. from Princeton University and his Ph.D. in Computer Science from Carnegie Mellon University under Gary Miller. He spent two years as a postdoc with the Geometrica group at Inria Saclay in France. He is now Assistant Professor of Computer Science at The University of Connecticut. His research is in algorithms and data structures in computational geometry and topological data analysis.

All are welcome!


 

QoS Throttling to Elicit User Cooperation in Computer Systems

Date/Time: 11:00AM, Wednesday, April 8, 2015, pre-meeting refreshments starting at 10:45 AM
Location: ECE 202, New Jersey Institute of Technology; Direction to NJIT can be found at: http://www.njit.edu/about/visit/gettingtonjit.php
Host: IEEE Communications Society North Jersey Chapter
IEEE Computer Society North Jersey Chapter
NJIT Helen & John C. Hartmann Department of Electrical and Computer Engineering
Register:https://meetings.vtools.ieee.org/meeting_registration/register/33851
Contact: For more information contact: Hong Zhao (201)-889-4677, zhao@fdu.edu; or Nirwan Ansari, nirwan.ansari@njit.edu

About the Speaker: Kevin A. Kwiat is a Principal Computer Engineer with the U.S. Air Force Research Laboratory (AFRL) in Rome, New York where he has worked for over 31 years. He is currently assigned to the Cyber Assurance Branch. He received the BS in Computer Science and the BA in Mathematics from Utica College of Syracuse University, and the MS in Computer Engineering and the Ph.D. in Computer Engineering from Syracuse University. He holds 4 patents. In addition to his duties with the Air Force, he is an adjunct professor of Computer Science at the State University of New York at Utica/Rome, an adjunct instructor of Computer Engineering at Syracuse University, and a Research Associate Professor with the University at Buffalo. He is an advisor for the National Research Council. He has been recognized by the AFRL Information Directorate with awards for best paper, excellence in technology teaming, and for outstanding individual basic research. His main research interest is dependable computer design.

About the Talk:
While there exist strong security concepts and mechanisms, implementation and enforcement of these security measures is a critical concern in the security domain. Normal users, un‐aware of the implications of their actions, often attempt to bypass or relax the security mechanisms in place, seeking instead increased performance or ease of use. Thus, the human in the loop becomes the weakest link. This shortcoming adds a level of uncertainty unacceptable in highly critical information systems. Merely educating the user to adopt safe security practices is limited in its effectiveness; there is a need to implement a technically sound measure to address the weak human factor across a broad spectrum of systems. In this talk, we present a game theoretic model to elicit user cooperation with the security mechanisms in a system. We argue for a change in the design methodology, where users are persuaded to cooperate with the security mechanisms after suitable feedback. Users are offered incentives in the form of increased Quality of Service (QoS) in terms of application and system level performance increase. Users’ motives and their actions are modeled in a game framework using the class of generalized pursuit‐evasion differential games.

Approved for Public Release; Distribution Unlimited: 88ABW-2008-1165

All are welcome! You do not have to be a member of the IEEE to attend. Bring your friends and network during the pre- meeting refreshments starting at 10:45 A.M.


 

2015 Train-the-Trainer Workshops

Host: National CyberWatch Center and National Resource Center for Systems Security and Information Assurance
Register:CLICK HERE to CHECK out the OFFERINGS!
Contact: For questions regarding trainings, contact Lynn Dohm at ldohm@nationalcyberwatch.org.

National CyberWatch Center and the National Resource Center for Systems Security and Information Assurance are pleased to announce the spring/summer training schedule.

CISSP, Netlabs User Community Workshop, SCADA and many more!

Don't delay, seats are limited!

Cyber Quests Webinar Distance Learning, Various Cities

(ISC)²® CISSP® Course Distance Learning, Various Cities

ISACA Cybersecurity Fundamentals Certificate Distance Learning, Various Cities

The Art of Penetration Testing - Teaching Ethical Hacking College of Southern Nevada, North Las Vegas, NV

The Internet of Things ~ Network Security is Everything! College of Southern Nevada, North Las Vegas, NV

Using Cybersecurity Related Websites in the Classroom College of Southern Nevada, North Las Vegas, NV

Netlabs+ User Community Workshop Distance Learning, Various Cities

CSSIA 2015 Version of Security+ Distance Learning, Various Cities

SCADA Distance Learning, Various Cities

Netlabs+ User Community Workshop Distance Learning, Various Cities

(ISC)²® CISSP® Course Distance Learning, Various Cities

(ISC)²® SSCP® Course Distance Learning, Various Cities


 

Introduction to IPAD Forensics

Date/Time: Monday – April 6th, 2015 – 9 AM – 12:00 PM
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Host: Fairleigh Dickinson University
Cost: The cost is $50 for both FDU students and non FDU students -registration is best with a credit card to 201-692-6500 A certificate will be given to you at the end of class.
Contact: Eamon P. Doherty doherty@fdu.edu

Continuing Education
Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP, CISSP

Here is an opportunity to learn about the vocabulary and tools used in the field of IPAD Forensics (approx. 122 million people in the U.S. had an IPAD in 2013), and why such investigative knowledge is important for both businesses and security professionals.

The course topics include theory or practical training in the following:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from an IPAD, collecting pictures, deleted pictures, email, documents, generating a report with hash marks of all evidence gathered, communication data warrant, faraday bag, Predecessors of the IPAD, The IPAD Mini, The 4 Generations of the IPAD, Oxygen Forensics, Cellebrite ios Forenics, Lantern 3 We will also talk about the need for isolated forensic examination computers for use with the IPAD.


 

Hardware in Cybersecurity: From the Weakest Link to Great Promises

Date/Time: 1:00pm, Friday, April 3, 2015, pre-meeting pizza starting at 12:45 PM
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Host:
IEEE Computer Society North Jersey Chapter
Fairleigh Dickinson University Gildart Haase School of Computer Sciences and Engineering

About the Speaker: Gang Qu received his Ph.D. degree in computer science from the University of California, Los Angeles, in 2000. He is currently a professor in the Department of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland at College Park. He is also a member of the Maryland Cybersecurity Center and the Maryland Energy Research Center. Dr. Qu is the director of Maryland Embedded Systems and Hardware Security (MeshSec) Lab and the Wireless Sensors Laboratory. His primary research interests are in the area of embedded systems and VLSI CAD with focus on low power system design and hardware related security and trust. He studies optimization and combinatorial problems and applies his theoretical discovery to applications in VLSI CAD, wireless sensor network, bioinformatics, and cybersecurity. He has published more than 150 journal articles and conference papers in these areas. Dr. Qu is an enthusiastic teacher; he has taught and co-taught various security courses including VLSI Design Intellectual Property Protection, Cybersecurity for Smart Grid, Reverse Engineering and Hardware Security Lab, and a popular MOOC on Hardware Security through Coursera.

About the Talk: It is well-known that hardware implementation can outperform the software implementation of most applications, including security primitives such as encryption, by up to several order of magnitudes. However, hardware implementation may also make these mathematically sound security primitives vulnerable. In this talk, we will discuss the role of hardware in cybersecurity. First, we will use the finite state machine (FSM) model to demonstrate that systems built with today's design flow and tools are vulnerable against a simple random walk attack. We further show that a malicious designer can embed Hardware Trojan Horse (HTH) into the system to gain unauthorized control of the system. We then describe a practical circuit level technique to guarantee the trustworthiness of the circuit implementation of a given FSM. Second, we describe our recent work on physical unclonable function (PUF), a unique feature embedded in the chip during fabrication process. PUF has many promising applications in security and trust such as device authentication and secret key generation and storage. We will focus on the usability problems of PUF: how to push the amount of PUF information we can extract to the theoretical upper bound; how to ensure that the PUF information is random (and thus secure against attacks); how to improve the hardware efficiency when implementing a PUF. Finally, we will show very briefly a couple of our projects on hardware-software co-design in building security and trust to demonstrate the great promise that hardware can bring to cybersecurity.

All are welcome!

You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 12:45 P.M.


 

US Cyber Challenge: Cyber Quests

Host: Counter Hack Challenges
Register: Registration for Cyber Quests can be found here.

Cyber Quests are a series of fun but challenging on-line competitions allowing participants to demonstrate their knowledge in a variety of information security realms. Each quest features an artifact for analysis, along with a series of quiz questions. Some quests focus on a potentially vulnerable sample web server as the artifact, challenging participants to identify its flaws using vulnerability analysis skills. Other quests are focused around forensic analysis, packet capture analysis, and more. The quests have varying levels of difficulty and complexity, with some quests geared toward beginners, while others include more intermediate and ultimately advanced material.

A portion of the US Cyber Challenge, winners qualify for a spot at a summer USCC Summer Camp. More information about that camp can be found here.

Registration

Quiz


 

Digital Camera Forensics

Date/Time: Monday March 23, 2015 - 9 AM - Noon
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Host: Fairleigh Dickinson University
Cost: The cost for FDU students and others is $50. Registration is best with a credit card to 201-692-6500 , A certificate will be given to you at the end of class.
Contact: Prof. Eamon P. Doherty doherty@fdu.edu

Continuing Education Opportunity

With Prof. Eamon P. Doherty CCE, CPP, SSCP

The course topics include both theory and practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence, metadata, Steganography, data carving, and using tools such as DataLifter 2 and Recover My Files with a few digital cameras and we will also collect and analyze data from SD Cards, forensics is the intersection of law and science, lastly we will demonstrate a nanny cam bear and discuss where digital evidence may be found.

We will also talk about the need for isolated forensic examination computers for use with the cameras as well as write blockers to preserve camera data.

The course only meets one time, there are no pre-requisites.


 

2015 Energy Security Conference: Protecting Our Critical Infrastructure

Date/Time: Tuesday, March 10, 2015, 9:00 a.m. – 3:30 p.m.
Location: 1251 Avenue of the Americas (bet. 49th & 50th Streets), New York New York 10020
Host: Consulate General of Canada in New York
Contact: RSVP: (212) 596-1679 rsvp.ny@international.gc.ca

The Consulate General of Canada in New York is pleased to invite you to this exchange on policy and security best practices on protecting energy infrastructure that advance North American economic competitiveness, security and prosperity.

Refreshments and luncheon will be served


 

2015 National CyberWatch Center Webinars

Date/Time: All webinars are 30 minutes (except the one on Feb. 27th) and will begin at 11 a.m. ET.
Host: National CyberWatch Center
Register: Register here!
Contact: For questions regarding trainings, contact Lynn Dohm at ldohm@nationalcyberwatch.org.

Google Hangout Invitations will be sent to the email address you provide the day before the webinar. All webinars are 30 minutes (except the one on Feb. 27th) and will begin at 11 a.m. ET.

Don't delay, seats are limited!

The webinars are as follows:

Cyber Security Education Consortium (CSEC) Resources : February 27, 2015

Making Sense of Virtualization Degrees/Certificates/Certifications for Colleges/Universities : March 27, 2015

National Cyber League for the Classroom : April 24, 2015

National Centers of Academic Excellence in Information Assurance/Cyber Defense (CAE): Program Updates and Support : May 29, 2015

Q&A with Representatives from the Advanced Cyberforensics Education (ACE) Consortium : August 28, 2015

Q&A with Representatives from CyberWatch West : September 25, 2015

Content is King: National CyberWatch Center Curriculum Updates & What it Means for Your Institution : October 30, 2015

Stop.Think.Connect Program : November 20, 2015


 

Introduction to IPAD Forensics

Date/Time: Monday – February 23, 2015 – 9 AM – 12:00 PM
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Host: Fairleigh Dickinson University
Cost: The cost is $50 for both FDU students and non FDU students -registration is best with a credit card to 201-692-6500. A certificate will be given to you at the end of class.
Contact: Prof. Eamon P. Doherty doherty@fdu.edu

Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP

Continuing Education

Here is an opportunity to learn about the vocabulary and tools used in the field of IPAD Forensics (approx. 122 million people in the U.S. had an IPAD in 2013), and why such investigative knowledge is important for both businesses and security professionals.

The course topics include theory or practical training in the following:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from an IPAD, collecting pictures, deleted pictures, email, documents, generating a report with hash marks of all evidence gathered, communication data warrant, faraday bag, Predecessors of the IPAD, The IPAD Mini, The 4 Generations of the IPAD, Oxygen Forensics, Cellebrite ios Forenics, Lantern 3

We will also talk about the need for isolated forensic examination computers for use with the IPAD.


 

FBI Cyber Internship Opportunity - Short Deadline

Host: FBI

The attached flyer provides information about the Federal Bureau of Investigation’s Cyber internship PAID 10-week summer internship program beginning on June 1, 2015. Applications will be accepted online only at http://www.fbijobs.gov.


 

Faculty Opportunity: U.S. Airforce Summer Faculty Fellowship Program (AF SFFP)

Date/Time: November 21st 2014 at 5PM EST.
Host: Air Force Office of Scientific Research

The AF SFFP offers hands-on exposure to Air Force research challenges through 8- to 12-week research residencies at participating Air Force research facilities for full-time science, mathematics, and engineering faculty at U.S. colleges and universities.

Objectives: This program is sponsored by the Air Force Office of Scientific Research (AFOSR) and is administered by ASEE, which provides the oversight and administrative structure for the selection and appointment of applicants. The objectives of the AF SFFP are as follows:

  1. To stimulate professional relationships among AF SFFP participants and the scientists and engineers at Air Force research facilities
  2. To enhance the research interests and capabilities of faculty (both new and experienced researchers) in the U.S. academic community
  3. To elevate the awareness in the U.S. academic community of Air Force research needs and foster continued research at AF SFFP fellows' institutions
  4. To provide the AF SFFP participant opportunities to perform high-quality and meaningful research at Air Force Research Laboratory (AFRL) Directorates, Air Force Test Center, the United States Air Force Academy, or the Air Force Institute of Technology
  5. To provide nationally accredited mentoring of academic researchers at technical directorates of the AFRL, Air Force Test Center, the United States Air Force Academy, and the Air Force Institute of Technology.

Faculty members from Historically Black Colleges and Universities, Minority Institutions, American Indian Tribal Colleges and Universities, and Hispanic Serving Institutions (HBCU/MI/TCU/HIS), as designated by the U.S. Department of Education, are especially encouraged to apply!

Faculty members have the opportunity to bring a graduate student with them. Click here for eligibility.

To apply:

  • You will need an active e-mail address to create an application account. You will be able to create your own password.
  • A status display is located under the Application heading. Click the Status button to receive feedback on the completion status of your application.
  • The application is divided into six sections, each with its own completion status bar found on the Application Status page. All required information fields are designated with a red asterisk.

For more information: Click here!!!


 

Introduction to a FRED Station and Encase

Date/Time: Monday, November 17, 2014 – 9 AM - Noon
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Host: Fairleigh Dickinson University
Register: Registration is best with a credit card to 201-692-6500 or Maureen 201-692-6507.
Cost: The cost for FDU students and others is $50.
Contact: Prof. Eamon P. Doherty doherty@fdu.edu

Continuing Education

Taught by Prof. Eamon P. Doherty, Ph.D., CCE, CPP, SSCP

The course topics include both theory and practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence, metadata, forensic image, SD cards, hard drives, CDs, Guidance Software Encase, creating a report, write blocker, SAN Storage Area Network, The FRED Station hardware, powering it up.

A certificate will be given to you at the end of class.


 

Faculty Opportunity: Travel opportunity to the 2014 National Initiative for Cybersecurity Education (NICE) conference and expo

Date/Time: November 5-6, 2014
Location: Sheraton Columbia Town Center Hotel in Columbia MD
Host: National Initiative for Cybersecurity Education
Register:Travel Application Form Link
Contact: Click here to contact NICE

National Initiative for Cybersecurity Education (NICE) will be having its 5th Annual Cybersecurity Education Conference. Contingent on funding from the National Science Foundation, the National CyberWatch Center will pay travel expenses for selected faculty from the national academic community to attend the 2014 NICE Conference and Expo. Preference will be given to faculty who do not currently have grant support to attend cybersecurity conferences such as this.

The 5th Annual NICE conference promises to be highly informative - you will be able to see the Agenda on the NICE website. In addition to receiving valuable information, participants will have an outstanding opportunity to network and talk to professionals in government, professional associations and industry.

Please pay attention to the note at the bottom of the Travel Application Form with directions how to proceed.


 

NJIT's 4th Annual New Jersey Cyber Security Conference

Date/Time: Friday, October 24, 2014 8:30 – 4:00 pm
Location: Brookdale Community College 765 Newman Springs Road Lincroft, NJ 07738
Host: NJIT
Register: Register for the New Jersey Cyber Security Conference at: https://www.surveymonkey.com/s/5PNY8SR.
Contact: Michael Vance of the New Jersey Office of Homeland Security & Preparedness at (609) 588-0591 or e-mail michael.vance@ohsp.state.nj.us.

Internet-based communications, business transactions and data storage are no longer simply convenient; they are a necessity. Every day, more and more Americans depend on mobile devices and wireless connections to shop, learn and interact. Nationally, we are now tasked with expanding our capabilities to provide the same type of open access to our critical assets and communications infrastructure. The two combined are supporting our economy, public safety and national security. Yet, despite this rapid expansion of internet usage, our nation’s cultural awareness of cyber security continues to lag behind. The first step to protect these vital resources is to become aware of what cyber security is truly about, and what you need to know to help minimize the threats.

Conference attendees will hear from subject matter experts representing state government, federal agencies and private industry who specialize in various aspects of cyber security. This year’s keynote speaker is Scott Montgomery, Vice President and Chief Technology Officer of Worldwide Public Sector at McAfee, which is part of Intel Security. A number of break-out sessions will also be offered throughout the afternoon.

Who should attend?

Information security specialists, program managers, and individuals with IT responsibility are cordially invited to attend the 4th Annual New Jersey Cyber Security Conference on Friday, October 24th.

Note: Conference registration can only be accomplished online. Seating is limited and registrations will be accepted on a first come, first served basis. Confirmation e-mails, final agenda and directions will be sent to registrants on October 20, 2014.

Click here for the Agenda!


 

2014 Hacktoberfest @ InfoAge

Date/Time: October 18, 2014 10am – 5pm
Location: InfoAge Campus - 2201 Marconi Road - Wall, New Jersey - 07719
Host: OWASP SJ and ASIS Security

The OWASP SJ and ASIS Security is inviting you to their Hacktoberfest. This is a large event targeted for HS students and their parents and local college students. With the partnership of the FBI, CIA, and NSA as well the Wall Township schools, Brookdale, Monmouth U, Ocean CC, Ryder, and Princeton.

The annual event will be an awesome opportunity for everyone to learn about coding in addition to promoting all the awesome stuff at InfoAge. The events of the day will be a round robin workshop approach with stations devoted to Social Engineering, Cell Phone Hacks, Raspberry Pi Hacks, Mask making, and information sessions with the FBI, CIA, and NSA.


 

Student Opportunity: The National Cyber League (NCL) Invitation for student. Pre/Regular season registration is on

Date/Time: Fall 2014 Season; The Pre/Regular Season registration runs from August 23-September 20.
Host: National Cyber League
Cost: The Fall Season registration is $20 per player for the Pre/Regular Seasons and $25 per Post Season team.
Contact:info@nationalcyberleague.org

The National Cyber League (NCL) is pleased to offer a Fall 2014 season!

The NCL is an intercollegiate cybersecurity competition developed by National Science Foundation funded centers to make cybersecurity learning and practice fun and engaging.

Even students new to competitions can compete in three Capture the Flag competitions, thanks to our exclusive bracketing system.Prepare for CompTIA Security ™ and EC-Council Certified Ethical Hacker (CEH)™ certifications with labs and games and build some serious skills along the way. Faculty coaches get freeinstructor syllabi, to help integrate the NCL experience into classes, as well as free hosted lab and game environment access.

We are committed to continuing to improve the NCL experience and hope you will participate in the 2014 Fall Season. Feel free to reach out with any questions.

Please spread the word! (To join the NCL mailing list, have faculty and students send an email with their name, email address, student or faculty status, and college/university affiliation to info@nationalcyberleague.org.)


 

IEEE NJ Section – Seminar on Benchmarking on Experimental Processor Becomes Computer Architecture Concept Worth Teaching

Date/Time: 11:00AM Tuesday, September 9, 2014, pre-meeting pizza starting at 10:50 AM.
Location: Becton Hall BEC405, Fairleigh Dickinson University, 1000 River Rd, Teaneck, NJ 07666.
Host:
IEEE Computer Society
Fairleigh Dickinson University School of Computer Sciences and Engineering
Contact: For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu; or Howard Leach, h.leach@ieee.org

IEEE Computer Society and School of Computer Sciences and Engineering will cosponsor a seminar titled "Benchmarking of Experimental Processor Becomes Computer Architecture Concept Worth Teaching" by Dr. Kevin Kwait, Principal Computer Engineer from Air Force Research Laboratory at Rome, NY.

Dr. Kwiat has been with U. S. Air Force Research Laboratory for over 30 years. In addition to his duties with Air Force, Dr. Kwiat also takes on many other roles such as adviser for National Research Council , visiting scientist at Cornell University, and a visiting researcher at the University of Edinburgh as part of the Air Force Office of Scientific Research “Window on Europe” program. Dr. Kwiat gave the keynote speech at the first Symposium on Advances in Cybersecurity and Information Assurance held at FDU.

Abstract: A challenge to Air Force engineers was to design and develop a radiation-hardened microprocessor that embodied, at that time, a radical computer architecture. The requirements for space-borne processing called for designing a processor that, in addition to being rad-hard, fault-tolerant, and testable, would also achieve a high-level of performance. The measure of performance would come through the execution of a set of programs in a process called benchmarking. Experimental microprocessor designs impose limitations on benchmarking. Their fundamental novelty means that they have not yet incorporated many of the benchmarking support features found on fully developed machines. Benchmarking is considered premature without these support features; yet, once meaningful performance measurements are obtained, then resources for further microprocessor development can be turned to the most promising of the proposed designs. The team devised a work-around to the problem of benchmarking a microprocessor early in its design: they created within the benchmark programs software simulations of a specialized hardware structure. This virtualization of hardware by software "matured" the design to the point needed for realistic performance measurement.

These lessons have been transferred to a computer architecture course where the students mimic the same challenges that faced the Air Force team who confronted benchmarking experimental microprocessors. By carrying out the term project, the college students gain experiential knowledge of designing hardware - in software - for solving a practical problem that remains relevant today.

Please come join us for this very informative talk and also encourage your students to come.

All are welcome! You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 10:50 A.M.


 

Digital Forensics Special Interest Group (SIG) – Fall 2014

Date/Time: This SIG meets on 2 Monday afternoons per month from 2:00 – 3:00 PM during the Fall Semester of 2014.
Location: Cybercrime Training Lab 2, Second Floor of Dickinson Hall , Hackensack side of Metro Campus
Host: Fairleigh Dickinson University
Contact: Eamon P. Doherty doherty@fdu.edu

The SIG is for full or part time FDU students. The SIG will help students learn about mobile device forensics. Equipment, tools, policy, and techniques will be both demonstrated and discussed. It is free to attend.

Prof. Eamon P. Doherty Ph.D., SSCP, CPP, CCE

Week 1: GPS Device Forensics

Week 2: IPAD Forensics

Week 3: Digital Camera Forensics

Week 4: Pager Systems Forensics (3.5 million in use in USA, 2012)

Week 5: Steganography, Data Carving, Detecting Steganography

Week 6: Look at Chain of Custody, Computer Usage Policy, Internet Policy, Phone Policy, and the Importance of General Counsel and HR

Week 7: Going to Conferences, Writing Papers, the Importance of Publishing, Networking

Week 8: CCTV Intro

Week 9: Intro to Logic Cub

Week 10: Legacy Media Forensics (CF Cards, Jazz Disks, Zip Disks, 3.5, 5.25” and 8 Inch Diskettes, XD Cards)


 

The 2014 International Conference on Frontiers in Education: Computer Science and Computer Engineering

Date/Time: July 21 to 24, 2014
Location: Monte Carlo Resort, Las Vegas, USA
Host: FECS
Register: Click here to register for the Colloquium

Conference Description: FECS is an international conference that serves researchers, scholars, professionals, students, and academicians who are looking to both foster working relationships and gain access to the latest research results. Learn more here.


 

Listen to General James E. CartWright at NIKSUN WWSMC Summer '14

Date/Time: June 25th & 26th 2014
Location: DoubleTree by Hilton Hotel Princeton, NJ, 4355 US Route 1, Princeton, New Jersey, 08540
Host: NIKSUN
Contact: If you have any questions, please feel free to contact marketing@niksun.com or T: 1-609-452-2400

It is with great pride and pleasure that we invite you and your colleagues to attend the NIKSUN World Wide Security and Mobility Conference (WWSMC), Summer ‘14, being held in Princeton, NJ on June 25th and 26th, 2014. The opening day, June 25th is open to the general public, while the second day is for NIKSUN resellers/Partners only. Come join us to learn about the latest advances in cybersecurity and mobility, network with your colleagues, and perhaps learn something new to take back with you!

Hear keynote speech by General James E. Cartwright, Former Vice Chairman of the Joint Chiefs of Staff, eminent cybersecurity expert, Dr. Parag Pruthi, CEO of NIKSUN. Listen to leading cybersecurity experts from the telco, government, and enterprise sectors talk about the latest innovations and state-of-the-art advances in cyber and mobile security.

Visit our website for detailed agenda.

To ensure that you get the most out of NIKSUN WWSMC Summer ‘14, we encourage you to register today. Space is limited so advanced registration is required.

We look forward to seeing you at this exciting event!


 

The 18th Annual Colloquium for Information Systems Security Administration

Date/Time: June 16-18, 2014
Location: San Diego, California
Register: Click here to register for the Colloquium

Colloquium Description:
The Colloquium for Information Systems Security Education recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels. See complete agenda here.


 

Introduction to IPAD Forensics Continuing Education

Date/Time: Thursday, June 12th, 2014 - 9:00AM - 12:00PM
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack
Host: Fairleigh Dickinson University

An opportunity to learn about the vocabulary and tools used in the field of IPAD Forensics (approx. 122 million people in the U.S. had an IPAD in 2013), and why such investigative knowledge is important for both businesses and security professionals. See flyer for more information.


 

17th Annual New York State Cyber Security Conference (NYSCSC ’14) and 9th Annual Symposium on Information Assurance (ASIA ’14)

Date/Time: June 3 - 4, 2014
Location: Empire State Plaza in Albany, NY
Register: Register today at www.dhses.ny.gov/go/conference2014
Contact: - Free to government and public sector employees - $50 for not-for-profit employees* - $200 for private sector employees*

*Group discount of 20% for 5 or more employees from the same organization.

Please join us to hear from prominent security experts presenting the latest topics and issues in cyber security. The June 3 keynote will be provided by the Governor’s Cyber Security Advisory Board.

NEW FOR 2014: Hands-on training classes in Digital Forensics and Cyber Incident Analysis and a Cyber-Challenge!

About the Symposium: This two day event is co-hosted by the New York State Office of Information Technology Services’ Enterprise Information Security Office, the University at Albany’s School of Business and College of Computing and Information, and The NYS Forum, Inc.


 

IEEE Signal Processing Chapter and Circuits and Systems Chapter Seminar at NJIT

Date/Time: 19th May 2014
Location: Room ECE 202, NJIT
Contact: For more information contact: Yun Shishi (973)-596-3501, Alfredo Tan (201) 692-2347 or Durgamadhab Misra 973-596-5739

Speaker: Professor Hsueh-Ming HANG, Chiao-Tung University, Taiwan

Topic: Technology and Standard for Virtual-view 3D Systems

Seminar: 3D video products are aggressively growing recently. One step further, the virtual-viewpoint (or free-viewpoint) video becomes the research focus. It is also an on-going standardization item in the international ITU/MPEG Standards. In addition to the movie special effects, one application of virtual-view system is the multi-view auto-stereoscopic (glasses free 3D) display. Typically, a densely arranged camera array is used to acquire input images and a virtual view picture is synthesized using the depth-image based rendering (DIBR) technique. Three essential components are needed for building a virtual-view system: depth estimation, data compression, and view synthesis. The ITU/MPEG standard committee is now in the process of defining the data compression (delivery format) of the virtual-view system. The committee also provides non-normative depth estimation and view synthesis tools. The entire set of standard specifications is to be done in two years. We will summarize the recent progress and technology trend on this subject. Click here for more information

All are welcome! You don't have to be an IEEE Member to attend.


 

The 23rd Wireless and Optical Communication Conference (WOCC 2014)

Date/Time: May 9 - 10, 2014
Location: New Jersey Institute of Technology, 154 Summit Street, University Heights, Newark, 07102
Host: New Jersey Institute of Technology and sponsored by IEEE

Call for Papers Deadline February 15, 2014; Acceptance Notification March 15, 2014
Learn more

Original technical papers are solicited on the topics including, but not limited to, the following:

  • Wirless Symposium Networks Symposium
  • Optical Symposium Big Data Symposium

About the Conference:
The 23rd Annual Wireless and Optical Communications Conference (WOCC 2014) will provide a unique opportunity to explore the leading areas of wireless and optical communications technologies, future network and big data.


 

The Rothman Institute of Entrepreneurship Breakfast Seminar & Our Cybersecurity member, Dr Kiron Sharma, would be presenting

Date/Time: Thursday, April 24, 2014
Location: Lenfell Hall, Hennessy Hall (Mansion) Fairleigh Dickinson University's College at Florham 285 Madison Avenue, Madison, NJ 07940
Host: Fairleigh Dickinson University
Register: With Eventbrite
Cost: $75.00
Contact: Please call 973-443-8842 or e-mail rothman@fdu.edu.

About the Seminar: This breakfast seminar is designed to help business leaders learn about innovative strategies being used to fight the counterfeiting of products. In addition, business leaders will understand how to more effectively develop and implement tactics to protect their company, customers and the community.

"Synopsis - 2014 Innovation Conference: Counterfeiting - Protecting the Supply Chain"

Agenda:

7:15 Breakfast and Registration
8:00 Welcome & Introductions, James Almeida, Dean, SCB
8:10 Counterfeiting- An Overview, Ron Guido, Life Care Services
8.20 Pursuing Supply Chain Security in the Pharma Industry, Brian Johnson, Pfizer
8:30 The Role of Law Enforcement, Anthony Orosz, U.S. Customs & Border Protection
8:40 Cyber Security Perspectives, Kiron Sharma, FDU
8:50 Panel discussion, Q & A
9:15 Conclusion

Click for details: http://view.fdu.edu/default.aspx?id=3712

Speakers: Ron Guido, Brian Johnson, Kiron Sharma, Anthony Orosz.

RSVP by April 20th!


 

IEEE North Jersey Section Computer Chapter Seminar

Date/Time: 12:00PM, Wednesday, April 23, 2014, pre-meeting pizza starting at 11:45 AM.
Location: Muscarelle Center, Auditorium 105 Fairleigh Dickinson University, 1000 River Rd, Teaneck, NJ 07666.
Host: Fairleigh Dickinson University
Contact: For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu; or Howard Leach, h.leach@ieee.org.

Seminar: IEEE North Jersey Section Computer chapter and our school will co-sponsor a seminar entitled “Big Data Analysis in Credit Card Industry” on 04/23/2014 at 12:00pm in M105. The speakers, Dr. Lana Song and Dr. Jun Bai, are from JP Morgan Chase. Dr. Lana Song is a Director at JP Morgan Chase leading Core Risk Modeling group for Chase Card Services and Dr. Jun Bai is a Senior Manager at JP Morgan Chase Card Services. The talk will be of interest to engineering, computer science, and math majors and faculty. See flyer for more details

All are welcome!

You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 11:45 A.M.


 

The 2014 International Conference on Frontiers in Education: Computer Science and Computer Engineering

Date/Time: April 19, 2014

Call for Papers by April 19, 2014 - find out more here.


 

IEEE North Jersey Section Exploring Clouds as Enablers of Science

Date/Time: Wednesday, April 2, 2014 at 12:00PM; pre-meeting pizza starting at 11:45AM
Location: Fairleigh Dickinson University, Muscarelle Center, 105 (Auditorium), 1000 River Road, Teaneck, NJ 07666
Host: Fairleigh Dickinson University

About the Presentation: Cloud computing has emerged as a dominant paradigm that has been widely adopted by enterprises. Clouds provide on-demand access to computing utilities, an abstraction of unlimited computing resources, and support for on-demand scale up, scale down and scale out. Clouds are also rapidly joining high-performance computing system, clusters and Grids as viable platforms for scientific exploration and discovery. As a result, understanding application formulations and usage modes that are meaningful in such a hybrid infrastructure, and how application workflows can effectively utilize it, is critical. In this talk, I will l explore the role of clouds in science and engineering. I will also explore how science and engineering applications can benefit from clouds and how the cloud abstraction can lead to new paradigms and practices. This talk is based on research that is part of the CometCloud autonomic cloud-computing project at the NSF Cloud and Autonomic Computing Center at Rutgers.

Speaker: Dr. Manish Parashar is Professor of Electrical and Computer Engineering at Rutgers University. He is the founding Director of the Rutgers Discovery Informatics Institute (RDI2) and of the NSF Cloud and Autonomic Computing Center (CAC), and is Associate Director of the Rutgers Center for Information Assurance (RUCIA). Manish received a BE degree from Bombay University, India, and MS and Ph. D. degrees from Syracuse University. His research interests are in the broad areas of Parallel and Distributed Computing and Computational and Data-Enabled Science and Engineering. A key focus of his research is on addressing the complexity or large-scale systems and applications through programming abstractions and systems. For more information on the event see Event Flyer


 

The 18th Annual Colloquium on Information Systems Security Education

Call for Papers by March 30, 2014 - find out more here.


 

LINCS Canvas Browser: Interactive Web App to Query, Browse and Interrogate L1000 Gene Expression Signatures

Date/Time: Wednesday, March 5, 2014 at Noon (pizza starting at 11:40 a.m.)
Location: Fairleigh Dickinson University, Muscarelle Center, 1000 River Road, Teaneck, NJ 07666
Host: Fairleigh Dickinson University
Contact: For more detailed information or contact Alfredo Tan at tan@fdu.edu or Hong Zhao at zhao@fdu.edu

Speaker: Dr. Avi Ma’ayan, Department of Pharmacology and Systems Therapeutics, Icahn School of Medicine at Mount Sinai
Purpose: The LINCS Canvas Browser (LCB) is an interactive HTML5 web-based application that facilitates querying, browsing and interrogating almost all currently available LINCSS gene expression data by implementing two compacted layered canvases. See Flyer.


 

The National CyberWatch Center

Date/Time: A monthly series at 11 am EST (see link below for dates and topics)
Location: A monthly Webinar Series
Host: National CyberWatch Center
Register:HERE

The National CyberWatch Center presents a monthly webinar series to discuss Cybersecurity Education and Workforce Development. See Flyer for more information!!

Webinar topics and schedule follow:

National Curriculum - What are the benefits of mapping my curriculum to the National Cybersecurity Workforce Framework? - How does this help for articulating AAS degrees to bachelor degrees? - What are the advantages of competency-based assessments?

Conducting Classroom-Based Research - How can I increase what I know about my students and improve what they learn? - What methods can I use to learn what works with my students AND makes my job easier? - What do I need to know to get started?

National Cybersecurity Student Association - Why should I encourage students to join? - What are the students saying? - How can industry and government help?

National Cybersecurity Workforce Framework 2.0 - What are the differences between 1.0 and 2.0? - Why did they change? - What are the opportunities for program development?

National Cyber League for the College Classroom - What is it? - How does it benefit me and my students? - How can I get started?

Security Clearances - What’s new? - What is most important to know? - What can we do to prepare students?

Critical Skills for Industry and Government - What skills do industry and government want? - Which skills are well covered in current programs? - What critical skills are still needed?

Cybersecurity Program Capacity Building - So I built it, why didn't they come? - Why do programs fail? - Where do I look for faculty resources?


 

2014 Canada-US Cybersecurity Conference: Securing our Financial Infrastructure

Date/Time: Friday, February 28, 2014
Location: Consultant General of Canada, Concourse Level, 1251 Avenue of the Americas, NY, NY 10020

Purpose: An exchangte of ideas on the interconnected nature of governmental policy, economic competitiveness and cybersecurity.

See Flyer for more information!!


 

Image Processing Pipeline of Digital Camera

Date/Time: Wednesday, February 26, 2014
Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105, 2000 River Road, Teaneck, NJ 07666
Host: Fairleigh Dickinson University

Purpose: This presentation will cover CMOS sensor digital image capture and image processing pipeline. Introduction about different techniques applied in image capture pipeline, such as bayer pattern raw image format, auto exposure, auto white balance, auto focus, bad pixel correction, lens shade correction, JPEG compression, etc.
Speaker: Zhicheng Ni, Ph.D. in Electrical and Computer Engineering from NJIT. He has worked on integration and enhancement of video encoders and decoders, as well as experience with various hardware platforms, including TI and Starcore DSPs.

See Flyer for more information!!


 

Digital Forensics Special Interest Group (SIG) – Spring 2014

Date/Time: The SIG meets on 2 Monday afternoons per month from 2:00 – 3:00 PM during the Spring Semester of 2014.
Location: Cybercrime Training Lab 2 on the second floor of Dickinson Hall, Fairleigh Dickinson University, Teaneck, NJ 07666
Contact: Eamon P. Doherty doherty@fdu.edu

The SIG is free to attend and is for FDU full or part time faculty, staff, and students. The SIG will help people learn about mobile device forensics, equipment, tools, policy, and techniques. Practical demonstrations and theory are part of the SIG.

Prof. Doherty Ph.D, SSCP, CCE, CPP

Week 1 – GPS Devices

Week 2 – IPAD Forensics

Week 3 - Digital Camera Forensics

Week 4 – Pager Systems (3.5 million in use in USA in 2012)

Week 5 – Steganography, Detecting Steganography

Week 6 – Chain of Custody, Computer Usage Policy, Phone Policy, Importance of General Counsel and HR

Week 7 – Going to Conferences, writing papers, the importance of publishing

Week 8 – CCTV Intro

Week 9 – Intro to Logic Cube

Week 10 - Legacy Media Forensics (CF Cards, Jazz Disks, Zip Disks, XD cards, 3.5, 5.25, and 8 inch floppy diskettes

Week 11 – Software to help parents keep kids safe


 

IEEE North Jersey Section Signal Processing Chapter: Canonical Correlation Analysis for Knowledge Discovery in Distributed Array Systems

Date/Time: Thursday, December 10, 2013 at 12 Noon; pre-meeting pizza starting at 11:40 a.m.
Location: Fairleigh Dickinson University, Muscarelle Center, M105 (Auditorium), 1000 River Road, Teaneck, NJ 07666
Host: Fairleigh Dickinson University

About the Presentation: This talk presents our analysis as well as simulation study on the adaptive beamforming and combining techniques applied to a system consisting of distributed antenna arrays. Our analysis reveals the connection between the natural and the practical schemes for data combination in array processing.
Speaker: Dr. Hongya Ge is an associate professor in the department of Electrical & Computer Engineering, New Jersey Institute of Technology (NJIT). Her research interests are in the general areas of statistical signal processing and communication theory with applications to parameter estimation and signal detection, rapid synchronization, interference suppression, and fact converging transceivers for multiuser systems; sensor array signal processing, spectral analysis and passive sensing and ranging in underwater acoustics; and radio frequency interference identification and excision in radio astronomy. She has published 100 papers in IEEE/IEE Journals and Conference Proceedings.

For more information on the event see Event Flyer


 

Discussion on Law Enforcement and Homeland Security

Date/Time: Wednesday, November 20, 2013 from 10 a.m. - 12 Noon
Location: Fairleigh Dickinson University, Dickinson Hall (Wilson Auditorium), 140 University Plaza Drive, Hackensack, NJ 07601
Host: Fairleigh Dickinson University

Speaker: John Miller is a former investigative journalist for WNBC (New York), NYPD Deputy Commissioner of Public Information, ABC co-host of 20/20 with Barbara Walters, LAPD Counter-Terrorism Chief, Assistant Director for Public Affairs of the FBI, Associate Deputy Director of National Intelligence for Analytic Transformation and Technology, and the only American news reporter ever to interview the late Osama Bin Laden (in May of 1998). John is currently a senior correspondent for CBS This Morning (New York).

For more information on the event see Event Flyer


 

A New Challenge for Image & Video Forgery with Viciousness or Innocuity

Date/Time: Thursday, November 14, 2013, pre-meeting pizza starting at 11:45 AM
Location: Muscarelle Center, Auditorium, 105 Fairleigh Dickinson University, 1000 River Rd, Teaneck, NJ 07666
Host: Fairleigh Dickinson University
Contact: Hong Zhao (201) 692-2350 or zhao@fdu.edu; or Howard Leach, h.leach@ieee.org Decoding the Next Generation Science

For more information on the event see Event Flyer


 

Standards: K-12 STEM Education Statewide Event

Date/Time: Friday, October 25, 2013
Location: Fairleigh Dickinson University, 285 Madison Avenue, Madison, NJ in the Dreyfuss Auditorium
Host: Fairleigh Dickinson University
Register: northjersey.com/STEM or call: 973-569-7562. Registration must be received by Monday, October 21st.

Keynote Speaker: Michael Heinz Science Coordinator of New Jersey Department of Education
Event Flyer


 

IEEE North Jersey Section Computer Society Chapter: Common Mistakes with Software Security

Date/Time: October 24, 2013 at 12:00PM (pre-meeting pizza starting at 11:30AM)
Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105, 1000 River Road, Teaneck, NJ 07666
Host: Fairleigh Dickinson University
Contact: For more information Contact: Hong Zhao (201) 692-2350 or zhao@fdu.edu; or Howard Leach at h.leach@ieee.org

What coverage does application penetration testing provide? What about architecture analysis or static analysis? How much security testing is enough? This talk will present essential security concepts and draw a distinction between the different options available through examples.

Participants will learn, through interactive discussion some common misconceptions and how to build or raise the level of a software security program. Participants will learn the essentials, and how to avoid some common pitfalls, of building a program that is tailored for each application and yet includes appropriate risk management at the line of business or enterprise level.

Biography: Andres Cools is a Managing Principal at Cigital, with over 15 years of experience in software & information security. Mr. Cools has delivered engagements in Governance, Risk & Compliance, Application and Network Threat and Vulnerability, Managed Security Services, Training, Products, Forensic and Incident Response, building out Software Security Groups, Building Security in Maturity Model, Threat Modeling, Architecture Reviews and Risk Profiling. As a consultant, Mr. Cools has provided strategic direction and services to many of the world's largest multinational corporations. Mr. Cools holds a BA in Business, with an emphasis in International Economics from Kennesaw State University


 

2013 3rd Annual New Jersey Cyber Security Conference

Date/Time: Wednesday, October 23, 2013, 8:30a.m. to 4 p.m.
Location: Law & Public Safety Technical Complex Auditorium, 1200 Negron Drive, Hamilton, NJ 08691
Register: Register for the New Jersey Cyber Security Conference at: https://www.surveymonkey.com/s/Z5RSSQJ. Upon completing the online form, please press the Done button at the bottom of the page to submit.

Cost: FREE

Conference Description: Conference attendees will hear from subject matter experts representing state government, federal agencies and private industry that specialize in various aspects of cyber security including cyber threats and trends. Additionally, panel discussions will be held on virtualization – security best practices, BYOD, cloud computing, and cyber threats and predictions.

Who Should Attend: Information security specialists, program managers, and individuals with IT responsibility

Flyer for Complete Information


 

The 6th Annual Cyber Security Expo "Cyber Espionage and IP Issues"

Date/Time: October 18, 2013
Location: The University of Memphis Center for Information Assurance, FedEx Institute of Technology, 365 Innovation Drive Suite 335A, Memphis, TN 38152-3115

Registration and Informationhere

Expo Description:
The University of Memphis Center for Information Assurance will be hosting the 6th Annual Cyber Security Expo at the FedEx Institute of Technology on October 18th, 2013. Information Assurance and Cyber Security experts will be onsite for presentations and networking to address current issues of cyber security.

Topics may include:
Intellectual Property(IP) Thefts

  • Advanced Persistent Threats
  • BYOD & Mobile Devise Security
  • Cloug & Big Data Security
  • Social Media Threats
  • Virtual Supply Chain Security

 

2013 Information Security Curriculum Development Conference (InfoSecCD2013)

Date/Time: October 11-12, 2013
Location: Kennesaw State University, Georgia
Register: Register and learn more: http://infosec.kennesaw.edu/infoseccd/

Summit Description:
InfoSecCD seeks to provide academics, researchers, and practitioners with an opportunity to share their perspectives with others interested in the various aspects of Information Security Curriculum Development. Papers offering novel research contributions in any aspect of information security education are solicited for submission to the 2013 InfoSecCD Conference.

The primary focus is on high-quality, original, unpublished research, case studies, and implementation experiences. Papers should have practical relevance to the design, development, implementation, and best-practices in information security education or for best-practices in the design, implementation, and management of information security or digital forensics.


 

Introduction to GPS Forensics

Date/Time: September 26, 2013, 8:30am to Noon
Location: Fairleigh Dickinson University, Cybercrime Training Lab 2, Dickinson Hall, 1000 River Road, Teaneck, New Jersey 07666
Host: Fairleigh Dickinson University
Register: Call FDU Continuing Education at 201-692-6500. You may register and pay for the course with a credit card and receive a certificate of completion after participating in the class. The course is limited to 16 students.

Continuing Education/Program Description: This introductory non credit continuing education course consists of two elements. The first element is practical while the other element is theoretical. The theoretical element consists of the history of GPS and a discussion of other competing systems such as Glonass and the Beidou Navigation Satellite System. We will also discuss relevant vocabulary such as routes, waypoints, trips, points of interest, and possible impairments to the accuracy of GPS data. The practical element consists of learning to use a Tableau write blocker, forensically imaging the GPS navigation device with FTK Imager or Helix, using GPS Babel to change file formats if necessary, and mapping the itinerary file using Google Maps.

See Program Flyer here


 

2013 Cyber Security Summit

Date/Time: September 25, 2013
Location: Hilton Grand Ballroom, 1335 Avenue of the Americas, New York, NY 10019
Register:http://www.cybersummitusa.com/agenda/

Summit Description: The 2013 Cyber Security Summit connects C-Suite executives in need of innovative solutions to protect their business & critical infrastructure. The event is produced by TechExpoUSA.com, the nation's leader in professional hiring events for the Defense and Intelligence industry. The Cyber Security Summit provides a forum for attendees to learn about cyber security’s most vital issues by directly connecting them with emerging and established service providers, renowned speakers and powerful decision makers across multiple industries.

Held in the world headquarters for business, culture, entertainment, finance, real estate, technology & development, the 2013 Cyber Security Summit will enlighten its global executive audience with expert keynote addresses & stimulating interactive panel discussions.


 

The IEEE North Jersey Section Computer Chapter and Signal Processing Chapter: Photonic Neuromorphic Spike Processing for Ultrafast Cognitive Computing

Date/Time: 12:00 Noon, Wednesday, September 25, 2013; pre-meeting with free pizza starting at 11:30 A.M.
Location: Muscarelle Center, M105 (Auditorium), Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ
Host: Fairleigh Dickinson University

There has been a recent explosion of interest in spiking neural networks, which code information as spikes or events in time. Spike encoding is widely accepted as the information medium underlying the brain, but it has also inspired a new generation of neuromorphic hardware. Although electronics can match biological time scales and exceed them, they eventually reach a bandwidth fan-in trade-off. An alternative platform is photonics, which could process highly interactive information at speeds that electronics could never reach. Correspondingly, processing techniques inspired by biology could compensate for many of the shortcomings that bar digital photonic computing from feasibility, including high defect rates and signal control problems. We summarize properties of photonic spike processing and initial experiments with discrete components. A technique for mapping this paradigm to scalable, integrated laser devices is explored and simulated in small networks. This approach promises to wed the advantageous aspects of both photonic physics and unconventional computing systems. Further development could allow for fully scalable photonic networks that would open up a new domain of ultrafast, robust and adaptive processing. Applications of this technology ranging from nanosecond response control systems to fast cognitive radio could potentially revitalize specialized photonic computing.

Biography: Bhavin J. Shastri received the Ph.D. degree in electrical engineering from McGill University, Montreal, QC, Canada, in 2011. He is currently a Postdoctoral Research Fellow at Princeton University, Princeton, NJ, USA, working on ultrafast cognitive computing---neuromorphic engineering with photonic neurons. Dr. Shastri has garnered many research awards such as the 2012 D. W. Ambridge Prize for the top graduating Ph.D. student, IEEE Photonics Society 2011 Graduate Student Fellowship, 2011 Postdoctoral Fellowship from National Sciences and Engineering Research Council of Canada (NSERC), and a 2008 Alexander Graham Bell Canada Graduate Scholarship from NSERC. He was the recipient of the Best Student Paper Awards at the 2010 IEEE Midwest Symposium on Circuits and Systems (MWSCAS), the co-recipient of the Silver Leaf Certificate at the 2008 IEEE Microsystems and Nanoelectronics Conference (MNRC), the 2004 IEEE Computer Society Lance Stafford Larson Outstanding Student Award, and the 2003 IEEE Canada Life Member Award


 

IEEE North Jersey Advanced Communications Symposium

Date/Time: September 21, 2013
Location: Babbio Center, Stevens Institute of Technology, Hoboken, NJ

Symposium Description and Call for Posters!!
The IEEE North Jersey Section and its Communications, Computer and Vehicular Technology Chapters are organizing a one-day technical symposium covering wireless communication and related topics at the Babbio Center on Saturday, September 21, 2013. The event consists of eight invited presentations given by distinguished speakers as well as poster sessions by invited graduate students/postdocs. There will be plenty of opportunity to interact with presenters and network with peers at the coffee breaks, during the lunch and the closing reception.

The organizing committee is currently inviting graduate students to prepare a poster presentation on recent work, recent research results, and cutting edge developing technologies in communications and related fields. Masters students, PhD candidates, and post docs are encouraged to participate. The posters session will be particularly helpful for student researchers to have direct interactions with faculty, industry personnel and other peers. This will serve as an excellent platform and opportunity to network for future collaborative research and career advancement.

Poster presentations will be on display all day and a special dedicated exhibition hour is scheduled for all attendees. Presenters have opportunities to interact with all attendees. There is no charge of registration fee to poster presenters. Three outstanding posters will receive 2013 IEEE North Jersey Section Communications Poster Awards. The 1st/2nd/3rd place winners will receive prizes of $400/$300/$200 respectively (one prize per winning poster). All poster presentations will receive participation certificates. All submissions will be subject to review by the organizing committee. If interested, please submit a title and a short abstract of 250 words to the poster session coordinator Prof. Hong Man at hong.man@stevens.edu by September 6, 2013. If accepted, the electronic version of the poster is due on September 15, 2013.


 

The 2013 NICE Workshop: Navigating the National Cybersecurity Education InterState Highway

Date/Time: September 17-19, 2013
Location: Gaithersburg, MD

Workshop Description:
The National Initiative for Cybersecurity Education (NICE) will host its annual “Shaping the Future of Cybersecurity Education Workshop” at the National Institute of Standards and Technology (NIST) location in Gaithersburg, MD. The NICE Initiative is focused on enhancing the overall cybersecurity posture of the United States by accelerating the availability of educational and training resources designed to improve the cyber behavior, skills, and knowledge of every segment of the population.

The 2013 NICE Workshop theme is "Navigating the National Cybersecurity Education Interstate Highway". The Workshop will highlight cybersecurity education concepts, tools, and best practices with a focus on successes at the State and Federal levels. The goal is to highlight cybersecurity awareness, education, and training programs that can be adopted, copied, or used, or built-on by small businesses, educational institutions, industry, and government at the states, local, tribal and Federal levels to advance the strategic goals of NICE.

The workshop asks presenters, panelists, and participants to share information and use lessons learned and best practices to help attendees grow their cybersecurity toolkit and remind everyone of the critical role each plays in advancing the strategic goals of NICE:

  • Raise national awareness about risks in cyberspace;
  • Broaden the pool of individuals prepared to enter the cybersecurity workforce; and
  • Cultivate a globally competitive cybersecurity workforce.

More information about NICE the Strategic Plan and past NICE Workshops can be found by visitinghttp://csrc.nist.gov/nice/


 

International Conference on Cyber Security

Date/Time: August 5 - 8, 2013
Location: Fordham University at Lincoln Center, 113 West 60th Street, New York, NY 10023
Register: Click here to register for the Conference
Cost: The cost for ICCS 2013 is $725.

Conference Description: ICCS is the premier global cyber security event spanning three days with more than 85 unique lectures from distinguished speakers from government, the private sector and academia. Each brings unique insights from their expertise in the disciplines of emerging technologies, operations and enforcement, academic and pragmatic experience. A range of keynote presentations, panel discussions, sponsors' presentations, exhibitions and exceptional networking opportunities provide a rare chance to learn and speak with leading cyber security subject matter experts and solution providers from throughout the world.


 

ICF International's CyberSci Summit 2013

Date/Time: June 25-26, 2013
Location: Arlington Hilton Hotel, Arlington, VA

Registration:CyberSci Summit 2013 event information

Summit Description: ICF International's CyberSci Summit 2013 (formerly known as Network Science and Reconfigurable Systems for Cybersecurity - NSRSC) will present and examine the latest emerging technology applications in next generation and beyond cybersecurity solutions. The goal of this technical gathering is to provide a venue for government, industry, and academia to discuss state-of-the-art and visionary developments spanning emerging technologies to meet the evolving requirements of security in cyberspace. For more information, speaker details, or registration costs, please visit ICFI.com/CyberSci


 

IEEE International Workshop on Security and Privacy of Mobile, Wireless and Sensor Networks

Date/Time: June 23, 2013 9:00 AM - 5:00 PM
Location: Co-located with IEEE SECON 2013 at New Orleans, USA

Workshop Description: To cope with the rapid increased in mobile users and the increasing demand for mobile, wireless and sensor networks (MWSNs), it is becoming imperative to provide the necessary security protocols and privacy guarantees to users of MWSNs. In turn, these specific demands in security and privacy require new methodologies that are specifically designed to cope with the strict requirements of the networks. In general, the real-world performance of MWSNs crucially depends on the selected protocols, and their suitability and efficiency for the layers of the implementation. A satisfactory security design and protocol are therefore crucial for the performance of MWSNs. It is a great challenge to achieve efficient and robust realizations of such highly dynamic and secure MWSNs. Moreover, the study of security and privacy in the context of MWSNs provides insights into problems and solutions that are orthogonal to programming languages, programming paradigms, computer hardware, and other aspects of the implementation. The objective for this workshop is to address those topics, which we believe will play an important role in current and future research on and education of MWSNs.

Important Dates: Paper Submission Deadline: March 22, 2013; Acceptance Notification: April 22, 2013


 

The 17th Annual Colloquium for Information Systems Security Administration

Date/Time: June 10-12, 2013
Location: Mobile Bay, Alabama
Register: Click here to register for the Colloquium

Colloquium Description: The Colloquium for Information Systems Security Education recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels. See complete agenda here.


 

A Symposium on Academic and Industry Perspectives on Cybersecruity

Date/Time: Wednesday, May 1, 2013 (8 a.m. to 4 p.m. - Breakfast and Lunch included)
Location: Fairleigh Dickinson University, Dickinson Hall, Wilson Auditorium, Teaneck, New Jersey
Host: Fairleigh Dickinson University
Register:Visit the event page to learn more and register online

Presenters: Dr. Kevin Kwiat (Air Force Research Laboratory; Dr. Jungwoo Ryoo (Penn State/Altoona); Mr. William Beckett (AT&T Labs Research); Dr. Justin Cappos (Polytechnic Inst of NYU); Fred Carl (InfoAge Museum); Dr. Eamon Doherty (FDU Cybercrime Laboratory: Hands-on demonstration)


 

Transforming ICT Networks for a Sustainable Future

Date/Time: Thursday, April 11, 2013 at 12 Noon; pre-meeting pizza starting at 11:30 a.m.
Location: Muscarelle Center Auditorium 105, Fairleigh Dickinson Univ, 1000 River Rd., Teaneck, NJ
Contact: For more information contact Hong Zhao (201) 692-2350, zhao@fdu.edu ; or Howard Leeach, h.leach@ieee.org

Presenter: Dr. Thierry E. Klein, Head of Green Research at Bell Labs, Alcatel-Lucent

Abstract
With the continued exponential growth of applications, services, devices and machines all being connected to the network, the total Internet traffic in the next decade is expected to grow to a level that is 30 to 100 times that of current levels. One of the challenges for next-generation networks is the ability to support the predicted traffic in a sustainable and economically viable way. In addition to the resulting increased power consumption, the rising energy costs, the environmental impact of networks, and more socially conscious consumers and service providers demand that our future communication and data networks are greener and more sustainable. During this presentation, Dr. Klein will review some of the current trends in communication and data networks and discuss the latest research to improve energy efficiency and reduce power consumption in wireless, wireline access, packet data and optical networks. He will also provide an overview and a status update of the GreenTouch consortium, an industry-wide initiative founded under the leadership of Bell Labs with the mission to deliver architectures, solutions and specifications, and to demonstrate key technologies, to improve the network energy efficiency by a factor 1000 compared to 2010 levels.

[[Full Bio and Abstract](http://view.fdu.edu/files/ieee_comp_soc_poster_transfrormingictnetworks_0411_2013.pdf)]


 

IEEE and SWE Student Branches at FDU Student Speakers

Date/Time: Wednesday, April 3, 2013 - 2:00 – 3:00 PM
Location: Fairleigh Dickinson University, Muscarelle Building Room 105
Host: Fairleigh Dickinson University

Speakers: Daniel Clarke and Steven Tegethoff

GILDART HAASE SCHOOL OF COMPUTER SCIENCES AND ENGINEERING
Center for Cybersecurity & Information Assurance
IEEE and SWE Student Branches at FDU
Present

Daniel Clarke, an electrical engineering major and Steven Tegethoff, an information technology / computer science student at Fairleigh Dickinson University, won the 15th and 30th places, respectively among the 104 finalists in the recently concluded New Jersey Governor’s CyberChallenge competition. This is a statewide cybersecurity competition hosted by Governor Chris Christie and the NJ Secretary of Higher Education and administered by the Brookdale Community College in cooperation with Cyber Aces Foundation. About 250 New Jersey college students, active duty and veteran armed services members and jobseekers participated in the challenge’s first phase, among which the top scorers entered the finals. Daniel and Steven will introduce the steps and challenges faced in the competition including the background, various levels, tools used, etc.


 

IEEE GeSI SMARTer2020: The Role of ICT in Driving a Sustainable Future

Date/Time: Wednesday, March 20, 2013/12 p.m.
Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105, Teaneck, New Jersey
Host: Fairleigh Dickinson University
Contact:For more information contact: Dr. Hong Zhao (201) 692-2350, zhao@fdu.edu or Howard Leach at h.leach@ieee.org

Presentation Flyer can be accessed here.
Presenter: Mr. Tom Okrasinski is Senior Manager of Sustainability & Environmental Engineering at Alcatel-Lucent's Bell Labs in Murray Hill, NJ.

Talk Description:
The Global e-Sustainability Initiative or GeSI published the SMARTer2020 Report in December of 2012. The Report demonstrates how the increased use of information and communication technology (ICT) such as video conferencing and smart building management could cut the projected 2020 global greenhouse gas (GHG) emissions by 16.5%, amounting to $1.9 trillion in gross energy and fuel savings and a reduction of 9.1 Gigatonnes carbon dioxide equivalent (GtCO2e) of greenhouse gases. This is equivalent to more than seven times the ICT sector’s emissions in the same period. The SMARTer2020 report evaluates GHG abatement potential from ICT-enabled solutions ranging across six sectors of the economy: power, transportation, manufacturing, consumer and service, agriculture, and buildings. The report also includes detailed national studies of the GHG abatement potential of ICT in seven countries: Brazil, Canada, China, Germany, India, the United Kingdom and the United States.


 

Tri-State Best Practices Conference: The Community College as a Place of Transition

Date/Time: March 9, 2013
Location: Bergen Community College/the Meadowlands Campus
Register: Click here to register for this Conference. Additional information.

Conference Description:
The purpose of the conference is to provide community college educators, high school educators, employers in the community, and four year college educators with a forum to exchange successful strategies for transitioning students and discuss expectations and learning goals at each level in the education system. What competencies and skill sets are high school students mastering or struggling to master before they enter community college? How can community colleges meet the needs of these incoming students and transition them to meet the expectations of a four year college? What skills are employers seeking from their applicants and how can community college instructors in all disciplines better prepare students for these workforce demands? What kinds of assignments, learning experiences, projects, technologies, and classroom practices have we found to be successful in aiding this transition and better assessing our students’ learning? The overarching goal, therefore, is the improvement of student learning outcomes, creation of more meaningful assessment techniques, and introduction of new technology and approaches that will best meet the needs of our community college students today and allow them to move successfully into the next stage of their education or professional life. Full Conference Description

FDU Presenters:
Dr. Neelu Sinha, Associate Professor, Department of Mathematics, Computer Sciences and Physics, Becton College of Arts & Sciences will be presenting during Session IV from 3:00-4:15pm Transitions through Technology in the Classroom with two FDU students (D. Bitsack and M. LaFranca) on Cyber Games - Fun to Play - That's the Learning Way.


 

7th International Technology, Education and Development Conference INTED2013

Date/Time: March 4 through 6, 2013
Location: Valencia, Spain
Register:Registration link
Contact: For information on the conference contact inted2013@iated.org

Invitees: Representatives from over 70 countries are expected inclusive of lecturers, researchers, academics, educational scientists and technologists from all disciplines and cultures.

Conference Description: The general aim of the conference is to promote international collaboration in Education and Research in all educational fields and disciplines. The attendance of more than 700 delegates from 70 different countries is expected.

Topics: Prospective authors are invited to submit the manuscripts of their original research contributions to iccci2013@siet.ac.in, review articles are also invited. Soft copy (.doc or .pdf formats) of the full papers not exceeding six pages and as per IEEE style which can be found in the conference website shall be submitted for the conference. Further, the paper should contain name of the corresponding author with E-mail ID and affiliation of all authors. Please indicate the discipline of the paper in the subject column of the mail. All the submitted papers will be sent for peer review and the corresponding author will be notified the outcome of the review process. If reviewers recommend for further improvements in the paper, the paper will be sent back to the corresponding author and the revised version should be submitted with in fifteen days on the date of receipt. Proceedings of ICCCI 2013 will be archived in IEEE Xplore Digital library.

Conference Website


 

Introduction to the SAFETY Act

Date/Time: February 14, 2013, 11 a.m. - 12 p.m. EST
Location: Webinar
Host: The Department of Homeland Security/SAFETY Act
Register: Please register here. A confirmation email will follow with specific login details for the webinar.

Webinar Description:
The DHS S&T Directorate of the Department of Homeland Security will be conducting its first SAFETY Act webinar, "Shaping your company's future with the SAFETY Act." We will discuss the mission of the SAFETY Act program and the substantial benefits that Designation and Certification can provide to your organization. The SAFETY Act provides important legal liability protections for providers of Qualified Anti-Terrorism Technologies - whether they are products or services. In addition, SAFETY Act protections encourage greater innovation and may make critical technologies and services more readily available.

Presented by:
Mr. Bruce B. Davidson Director, Office of SAFETY Act Implementation Science and Technology Directorate


 

Tagging and Tracking Technologies for High Value Material and Personnel

Date/Time: Monday, February 11, 2013, 11:30 a.m. - 12:30 p.m. EST
Location: Webinar
Host: The Department of Homeland Security/Office of National Laboratories
Register: Please register here. A confirmation email will follow with specific login details for the webinar.

Webinar Description: The Savannah River National Laboratory (SRNL) was requested to lead a Law Enforcement Working Group that ranked advanced tagging and tracking as the highest priority. Specifically the participating agencies were looking for technologies more robust than GPS. Using prototype technologies from Boeing, On Ramp and Fortress, SRNL was able to demonstrate the ability to track personnel and material in all scenarios including indoors, in heavily wooded areas, canyons and in parking garages. Bi-directional communication was achieved in areas that Wifi, cell towers or traditional radios would not perform. The results of the exercise will be presented. These technologies may be suitable for seamless tracking of high value material and personnel anywhere in the world, and in hazardous conditions.

Presented by: Mr. Joseph V. Cordaro Advisory Engineer, Savannah River National Laboratory Research and Development Engineering Technology


 

U.S. Export Controls: A Case Study

Date/Time: January 23, 2013
Location: Hoboden, New Jersey

Host Institution: Stevens Institute of Technology
Invitees: academic faculty and administrators

Program Description:
As part of the FBI’s Strategic Partnership Academic Alliance initiative, Assistant U.S. Attorney William Mackie will provide an overview of the Dr. Reece Roth case and keys to an effective compliance program.

Mr. Mackie will provide an overview of how academic or private sector research and development projects can exist successfully with the limits of U.S. export control laws using a case study of the prosecution and conviction of AGT, a defense contractor, and Dr. Reece Roth, a University of Tennessee professor, for export control violations. The keys to an effective compliance program and a mutually beneficial partnership with U.S. government research program will be highlighted.

About Mr. Mackie
Assistant U.S. Attorney William Mackie is a career prosecutor who has been with the Department of Justice for over fifteen years after starting out in private litigation practice in Atlanta and Washington DC. He is a graduate of Duke University Law School and Washington & Lee University. He started with the Department of Justice as a trial attorney in DC working on bank, tax and government program fraud cases. Later, he was appointed as an Assistant U.S. Attorney in Florida and subsequently transferred to his current position as an AUSA in Knoxville, TN.

During his time at DOJ, Mr. Mackie’s work focused primarily on white collar crimes, public corruption, organized crime, tax evasion and money laundering. Over the past five years, Mr. Mackie’s work has focused on national security related cases, including domestic and international terrorism, material support matters and weapons related export control cases.


 

IEEE 2013 International Conference on Computer Communication and Informatics (ICCCI 2013)

Date/Time: January 4 – 6, 2013
Location: Coimbatore, India

Invitees: International conference attendees

Conference Description: The International Conference on Computer Communication and Informatics (ICCCI 2013) is technically co-sponsored by IEEE Madras Section and aims to provide an outstanding opportunity for both academic and industrial communities alike to address new trends and challenges and emerging technologies on topics relevant to today's fast moving areas of Computer, Communication and Informatics. The conference will feature invited talks and referred paper presentations. The vision of this international conference is to foster communication among researchers and practitioners working in a wide variety of areas in Communication and Informatics with a common interest.

Topics: Prospective authors are invited to submit the manuscripts of their original research contributions to iccci2013@siet.ac.in, review articles are also invited. Soft copy (.doc or .pdf formats) of the full papers not exceeding six pages and as per IEEE style which can be found in the conference website shall be submitted for the conference. Further, the paper should contain name of the corresponding author with E-mail ID and affiliation of all authors. Please indicate the discipline of the paper in the subject column of the mail. All the submitted papers will be sent for peer review and the corresponding author will be notified the outcome of the review process. If reviewers recommend for further improvements in the paper, the paper will be sent back to the corresponding author and the revised version should be submitted with in fifteen days on the date of receipt. Proceedings of ICCCI 2013 will be archived in IEEE Xplore Digital library.


 

The International Relation of Cyber Crime

Date/Time: Tuesday, December 4, 2012 at 1:30 – 3:30 p.m. and Wednesday, December 5 at 3:30-4:30 p.m.
Location: Fairleigh Dickinson University (FDU), Edward Williams Hall, 150 Kotte Place, Hackensack, NJ
Host: Fairleigh Dickinson University

Invitees: Open to the general public, faculty, students and staff

Topics on 12/4/12:
(1) The International Relation of Cyber Crime
(2) Public Policy, Politics & Official Corruption

Speaker(s):
(1) Lt. Andrew Donofrio, Ret. Cybercrime Expert, Bergen County Prosecutor's Office and
(2) William "Pat" Schuber, Assistant Professor, School of Administrative Science, FDU

Topic on 12/5/12: An Answer to Gangs, Guns & Drugs
Speaker(s): Larry Spagnola, Chief of Police Ret., and Sergeant John Spano, Ret., Paterson Police Department
Invitees: Admission to these presentations is FREE, open to FDU community and general public


 

Fourth IEEE International Workshop on Information Forensics and Security

Date/Time: December 2-5, 2012
Location: Tenerife, Spain

Invitees: Open to the scientific community and general public

Webinar Description: A detailed Technical Program can be found http://www.wifs12.org/technical_program.html

Registration link


 

Cyber-Enabled Sustainability Science and Engineering (CyberSEES)

Date/Time: November 19, 2012, 4 to 5 p.m
Location: Coimbatore, India
Contact: Kenneth Whang (703) 292-5149 or kwhang@nsf.gov

Invitees: Open to the scientific community and general public

Webinar Description: The Cyber-Enabled Sustainability Science and Engineering (CyberSEES) program aims to advance interdisciplinary research in which the science and engineering of sustainability are enabled by new advances in computing, and where computational innovation is grounded in the context of sustainability problems. The CyberSEES program is one component of the National Science Foundation's Science, Engineering, and Education for Sustainability (SEES) activities, a foundation-wide effort aimed at addressing the challenge of sustainability through support for interdisciplinary research and education. In the SEES context, a sustainable world is one where human needs are met equitably without harm to the environment or sacrificing the ability of future generations to meet their own needs. This program is a joint effort of all of the NSF organizations listed on the cover page and the Semiconductor Research Corporation (SRC), through its Energy Research Initiative (ERI) program. While the scope of CyberSEES is broad as detailed herein, the NSF and SRC ERI collaboration within CyberSEES focuses on cyber-enabled sustainability research that addresses computational aspects of smart infrastructures, in particular the smart electric grid.


 

Machine-to-Machine Communications and Internet of Things

Date/Time: November 15, 2012, 11:30 for Pizza and Noon for Seminar
Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105
Host: Fairleigh Dickinson University

Invitees: Open to the general public, faculty, staff and students

Seminar Description: Machine-to-machine (M2M) communications, involving wide area communication of sensor data to an Internet based application, is emerging as an important paradigm in communications. With diminishing voice revenues, mobile network operators are increasingly relying on data services for revenue growth and M2M is a major area of focus within data services. Projections for number of M2M communication devices are around 12 Billion devices by the end of the decade with over 2 Billion M2M devices expected to directly attach to the mobile network by 2020. We will describe the current M2M market environment, emerging M2M solution architecture and various technology enhancements that will enable this phenomenal growth. We will also discuss ongoing standards activity in M2M and then summarize some of the main challenges that need to be addressed to realize the vision where everything is connected.

Speaker/Biography: Dr. Harish Viswanathan : Dr. Harish Viswanathan received his bachelor degree in Electrical Engineering from Indian Institute of Technology, Chennai, India, and M.S. and Ph.D. degrees from the School of Electrical Engineering, Cornell University, Ithaca, New York. Since joining Alcatel-Lucent, Bell Labs in October 1997 he has worked on multiple antenna technology for cellular wireless networks, network optimization, mesh networking, mobility management and optimization of video over mobile networks. He is currently CTO Advisor for M2M and Devices in the Corporate CTO organization within Bell Labs. His current responsibilities include identifying strategic directions that Alcatel-Lucent should pursue in the M2M and sensor networks areas and architecting end-to-end solutions for sensor related applications.


 

IEEE Smart Tech Metro Area Workshop

Date/Time: October 19-20, 2012
Location: Crowne Plaza White Plans, Westchester, NY
Cost: $129 for members and $179 for non-members, when you register by 15 September. Early Bird rates extended to 15 September

Invitees: Open to the general public, faculty, staff and students

Workshop Description: The two-day intensive Smart Tech Workshop offer parallel, all-day track sessions that allow attendees to immerse themselves in a given technology. The agenda and course description for each track can be found here. Attendees may choose one full-day track on each day of IEEE Smart Tech, or two half day courses.


 

FlashLinq: Enabling Proximal Internet

Date/Time: Thursday, October 11, 2012 Hours: 12 p.m.
Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105
Host: Fairleigh Dickinson University, Gildart Haase School of Computer Science and Engineering (GHSCSE) and the IEEE North Jersey Section Computer Society Chapter

Invitees: Open to the general public, faculty, staff and students

Program Description: FlashLinQ is a wireless communications system founded on the realization of a "wireless sense"-a sense whose embodiment in devices provides Internet application peers with a direct awareness of each other's physical proximity and relevance, creating a new form of proximity-aware internetworking, and thereby realizing a necessary step towards what we term a "Mobile Proximal Internet". The need for such a system arises from the pervasive spread of Internet devices and applications in our daily lives, and the practical limitations of current communications technologies in conveying knowledge of mutual proximity and relevance. In this talk, we introduce a mobile proximity-aware social network use case and describe the overview of air link technology.

Speaker/Biography: Dr. Junyi Li : Dr. Junyi Li is a Vice President of Engineering at Qualcomm Flarion Technologies, responsible for conceptualizing and developing next-generation wireless networking solutions. He was a key inventor of Flash-OFDM, arguably the first commercially deployed OFDMA-based mobile broadband wireless communications system. He holds over 150 U.S. patents and has more than 400 pending patent applications. He was a founding member of Flarion Technologies, a startup acquired by QUALCOMM in 2006. Prior to that, he was with Bell-Labs research in Lucent Technologies. He has a Ph.D. degree in E.E. from Purdue University and an MBA from the Wharton School at University of Pennsylvania. He is a Fellow of the IEEE.


 

Cyber Warfare - Dawn Of A New Era In Computers & Communications

Date/Time: September 20, 2012 from 11:30 to 2 p.m
Location: Fairleigh Dickinson University (FDU) Muscarelle Center, Auditorium 105, 1000 River Rd, Teaneck, NJ 07666
Host: The IEEE North Jersey Section Computer Society Chapter and the Gildart Haase School of Computer Sciences and Engineering at Fairleigh Dickinson University

Invitees: IEEE seminar series are open to the university public, both faculty and students.

The Seminar was organized by Dr. Hong Zhao, Assistant Professor, Fairleigh Dickinson University, GHSCSE, and Computer Society Chair of IEEE North Jersey Section. IEEE responsibilities include organizing seminars and meetings for computer society.

Seminar Description: President Obama's words, "cyber threat is one of the most serious economic and national security challenges we face as a nation" are now being echoed by many around the world. Recently, Gen. Keith Alexander, who commands the U.S. Cyber Command, stated that the capability exists today for destructive cyber attacks against critical infrastructures. Stuxnet and Flame were just two (now known) viruses that have unleashed significant destruction against Iran's nuclear program. In this talk, Dr. Pruthi will give an overview of the cyber security threat landscape, from cyber wars to espionage to hacktivism and everything in between. Traditional cyber defense tools and techniques will be discussed and their weaknesses will be highlighted. A case will be made for novel computer and communications technologies necessary to address the ever growing threat vectors. New technologies and paradigms and efficient strategies that are proving effective against sophisticated advanced persistent threats, trojans, botnets and worms will be discussed.

Speaker Biography: Dr. Parag Pruthi: Dr. Pruthi is the Founder and CEO of NIKSUN which he has built from a startup to a highly successful global ompany in the cyber security, wireless, and network monitoring markets. Recognized as one of the foremost experts in advanced cyber security technologies, Dr. Pruthi advises on cyber defense strategies with some of the highest levels of governments and enterprises around the world. He is a frequent speaker on cyber security issues, including keynotes to delegates from across 28 NATO nations, agencies, and strategic commands at the NATO Information Assurance Symposium 2010, 2011, and 2012. Dr. Pruthi received his Doctorate in Telecommunications from The Royal Institute of Technology, Stockholm, Sweden, and his thesis, "An Application of Chaotic Maps to Packet Traffic Modeling," was the first to apply chaotic and fractal systems to accurately model the seemingly erratic nature of network traffic. Dr. Pruthi continues to drive the advancement of cyber security and network monitoring applications and practices to new levels, regularly introducing highly innovative and state-of-the-art products that continue to pave the way in the industry.


 

Third Cyber Infrastructure Protection Conference 2012

Date/Time: September 13-14, 2012 (see program below for times)
Location: City College of New York, New York, NY10031
Host: CCNY and SSI, US Army War College, and Co-sponsored by IEEE New York Section and Computer Society NYC Chapter, http://www.ccny.cuny.edu/cip.

Invitees: Open to the general public, faculty, staff and students

Conference Description/Program:

Thursday

08:00- 04:00

Registration (Open to the General Public)

09:00- 09:15

Conference Chairs: Tarek Saadawi (City University of New York, City College), Colonel Louis Jordan (SSI, US Army War College)

09:15- 10:00

Keynote Speaker:
Prosecuting Cyber crime: An overview of the Manhattan District Attorney's Office's efforts to combat cyber crime and identity theft, David Szuchman, NYC DA

10:00- 10:15

Networking - Coffee Break

10:15- 11:45

Session I: Cyber Infrastructure

  • Practices for Winning the Battle against Insider Threats, Carly Lauren Huth, SEI, Carnegie Mellon University
  • Protecting a Global Services Company in a World of Evolving Threats , John Gevertz, ADP
  • (TBA) , E. Alshaer, University of North Carolina (To Be Confirmed)

12:00- 01:30

Luncheon

01:30- 02:15

Keynote Speaker:
Leveraging Cyber Militias as a Force Multiplier in Cyber Operations, Major Scott D. Applegate, George Mason University

02:15- 02:30

Coffee Break

02:30- 04:30

Session II: Cyber Crime
Session Chair: Douglas Salane from the Center for Cybercrime Studies, John Jay College

  • Cybercrime & Information Security Risks: New rewards & new risks - Why a different approach is needed. Mehul J. Vaidya, PricewaterhouseCoopers, LLP
  • Cyber Fraud Trends - The Musical, David Nelson, FDIC
  • Legislative and Regulatory Attempts to Address Cyber Crime: the Good, the Bad and the Ugly. Douglas Salane, Evan Misshula , John Jay College, CUNY
  • Analyzing Search-Engine Manipulation Campaigns. Nicolas Christin, CyLab, Carnegie Mellon

 

Friday

09:00- 09:45

Keynote Speaker:
Internet Security, William Cheswick

10:00- 10:15

Networking Coffee Break

09:15- 10:00

Keynote Speaker:
Prosecuting Cyber crime: An overview of the Manhattan District Attorney's Office's efforts to combat cyber crime and identity theft, David Szuchman, NYC DA

10:00- 10:15

Networking - Coffee Break

10:15- 11:45

Session III: Policy and Decision Making
Session Chair: Thomas Holt, Michigan State University

  • Predicting Cyber Attacks Against Critical Infrastructure, Thomas J. Holt, Michigan State University
  • Offender Decision Making in Industrial Control Systems Cybercrime, Aunshul Rege, Temple University
  • Cybercrime and Cyber-attacks Associated with China: Economic and Institutional Consideration, Nir Kshetri, University of North Carolina-Greensboro

11:45- 2:00

Luncheon

01:30- 02:15

Keynote Speaker:
Leveraging Cyber Militias as a Force Multiplier in Cyber Operations, Major Scott D. Applegate, George Mason University

02:15- 02:30

Coffee Break

02:30- 04:30

Session II: Cyber Crime
Session Chair: Douglas Salane from the Center for Cybercrime Studies, John Jay College

  • Cybercrime & Information Security Risks: New rewards & new risks - Why a different approach is needed. Mehul J. Vaidya, PricewaterhouseCoopers, LLP
  • Cyber Fraud Trends - The Musical, David Nelson, FDIC
  • Legislative and Regulatory Attempts to Address Cyber Crime: the Good, the Bad and the Ugly. Douglas Salane, Evan Misshula , John Jay College, CUNY
  • Analyzing Search-Engine Manipulation Campaigns. Nicolas Christin, CyLab, Carnegie Mellon

 


 

Overview of the National Initiative for Cybersecurity Education (NICE)

Date/Time: August 16, 2012 at 12:00-1:00pm
Host: NICE

Webinar Description: This presentation is an overview of the National Initiative for Cybersecurity Education (NICE). Initiative history, current status, and future directions will be covered along with insight into how cybersecurity education, awareness, training, and workforce development all interact and enable the larger Science, Technology, Engineering, and Mathematics (STEM) education enterprise of this country. A National Cybersecurity Workforce Framework document has been produced as part of this effort and provides the opportunity for the first time to discuss the total cybersecurity workforce using a common language. The ongoing adaption of this document inside and outside of Federal government will also be discussed.

Speaker(s): In early 2010 the National Institute of Standards and Technology (NIST) was selected as the lead agency for the National Initiative for Cybersecurity Education (NICE) and they identified Dr. McDuffie to be the Lead for this effort and has now completed his transition to this new position. In his previous position he had been appointed the Associate Director of the National Coordination Office (NCO) for Networking and Information Technology Research and Development (NITRD) in February 2008. From early September 2009 until early November 2009 he served as Acting Director of the NCO. His appointment as the Associate Director of the NCO comes after joining the NIST as a Computer Scientist in their Information Technology Laboratory, Office of Federal and Industrial Relations. In August 2006, Dr. McDuffie joined the NCO where he served as the Technical Coordinator for the Cyber Security and Information Assurance (CSIA) Interagency Working Group (IWG), Federal Agency Administration of Science and Technology Education and Research (FASTER) Committee of Practice (CoP), and the Software Design and Productivity (SDP) Coordination Group (CG). Prior to joining the NCO, Dr. McDuffie served as the Deputy Director of the Office of Naval Research (ONR) - Science and Technology for America's Readiness (N-STAR) Initiative. He served as the Lead Program Director for the Federal Cyber Service: Scholarship for Service (SFS) Program at the National Science Foundation (NSF). He served as an Assistant Professor at Florida State University in the Department of Computer Science where he taught both graduate and undergraduate courses in CS for seven years. Dr. McDuffie has participated in software engineering projects for the U.S. Air Force, the National Center for Atmospheric Research, the Federal Aviation Administration, Lockheed Missiles and Space Company, Los Alamos National Laboratory, and the National Security Agency. Dr. McDuffie received his Ph.D. and M.S. degrees in Computer Science from the Florida Institute of Technology in Melbourne, Florida.


 

14th Information Hiding Conference

Date/Time: May 15-18, 2012
Location: Berkeley, California

Invitees: Open to the public, faculty, students and staff.

Course Description: For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in digital rights management schemes. Steganalysis and forensics pose important challenges to digital investigators and privacy techniques try to hide relational information such as the actors' identities in anonymous communication systems. These and other topics share the notion that security is defined by the difficulty to make (or avoid) inference on certain properties of host data, which therefore has to be well understood and modeled.

Topics: Prospective authors are invited to submit the manuscripts of their original research contributions to iccci2013@siet.ac.in, review articles are also invited. Soft copy (.doc or .pdf formats) of the full papers not exceeding six pages and as per IEEE style which can be found in the conference website shall be submitted for the conference. Further, the paper should contain name of the corresponding author with E-mail ID and affiliation of all authors. Please indicate the discipline of the paper in the subject column of the mail. All the submitted papers will be sent for peer review and the corresponding author will be notified the outcome of the review process. If reviewers recommend for further improvements in the paper, the paper will be sent back to the corresponding author and the revised version should be submitted with in fifteen days on the date of receipt. Proceedings of ICCCI 2013 will be archived in IEEE Xplore Digital library.

Program and Speakers
Presentations and Proceedings


 

Expeditions in Large-Scale Computational Science on Production Distributed Cyber Infrastructure

Date/Time: March 7, 2012 from 11:30 a.m. to 1:30 p.m
Location: Fairleigh Dickinson University, Auditorium M105, Muscarelle Center, Teaneck, New Jersey 07666
Host: Fairleigh Dickinson University

Invitees: Open to the public, faculty, students and staff.

Course Description: Dr. Jha will discuss a series of cross-disciplinary research projects he has been involved in over the past several years. The ultimate aim of these projects has been to further an understanding of scientifically important processes. But the aim has not been confined to performing leading domain science; it has also been to develop the algorithms, formalisms and infrastructure to enable such science, at scales and with a sophistication and reduced time-to-solution that would not be possible otherwise. Dr. Jha posits that this requires working at the triple point of Computer Science, Computational Science and Cyber-infrastructure Research. Dr. Jha will present how these three strands come together to enable scientific advances in several grand challenge problems facing the Computational Biology community, for example data-analytics for next-generation gene sequencing, enhanced sampling algorithms at scale, and in-silico personalized and predictive health-care

Speaker Biography: Dr. Shantenu Jha is an Assistant Professor at Rutgers University, and a member of the Graduate Faculty in the School of Informatics at the University of Edinburgh (UK), as well as a visiting scientist at University College London. Till recently (08/2011) he was the Director, for Cyber-infrastructure Development at the CCT at Louisiana State University (LSU). His research interests lie at the triple point of Computer Science, Cyber-infrastructure Development and Computational Science. Prof. Jha leads the SAGA project (http://www.saga-project.org), which is an OGF standard and is part of the official middleware/software stack of most major Production Distributed Cyber-infrastructure -- such as US NSF's XSEDE and the EGI. Jha currently is the lead author of a book on "Abstractions for Distributed Applications and Systems: A Computational Science Perspective" to be published by Wiley in early 2012. He is the author of more than 60 publications. Jha is a co-PI for $2.6M NSF award that enables LSU/LONI participation as a TeraGrid Resource Provider. He is also the co-PI of a prestigious NSF award, "Large-Scale Replica-Exchange Studies Using Production Cyber-Infrastructure"; his work has been funded by US National Institute for Health (NIH) as we all as the UK EPSRC (OMII-UK project and Research theme via e-Science Institute).