University CenterUniversity of North Florida12000 Alumni DriveJacksonville, FL 32224-2678
Layne Wallace School of Computing University of North Florida 1 UNF Drive Jacksonville, FL 32224
How I Pwn Your
Network: A Chat with a Social Engineer
Do you want to know what real hackers
are doing to your infrastructure? Would you like to hear how we are able to
evade all of your expensive security controls? Stop wondering and ask! In this
highly interactive session, we'll chat with a professional social engineer and
facility breach expert, as they discuss what works and what doesn't in
protecting your infrastructure. You'll hear what makes his jobs harder....and
sometimes easier. Don't miss this rare engagement!
Since receiving his GCFA in 2003, Mike has been involved in Forensic Analysis regarding everything from litigation hold to discovery related to criminal matters. He has contributed to the SANS community by writing for the SANS Forensics blog site, as well as writing white papers, assisting with SANS curriculum, and with GIAC exam development. Today his work is focused primarily on Forensic Analysis.
Prior to moving into the Security realm, Mike has done network support and Information Systems auditing. He has also worked in the past as an independent contractor developing specialized billing and payroll systems. His experience with personal computers spans about 3 decades. Other certifications held include the EnCE (EnCase Certified Examiner), GSEC, and CISA (from ISACA).
University of North Florida
Dissecting a WormInternet "worms" are arguably the earliest form of a fully-automated cyber-attack, the absent need for human interaction implying that infection may propagate from one machine to another in a matter of seconds. We'll discuss one approach to representing worms when eyes are focused on the problem of their "zero-day" detection and containment. Is tackling this problem even remotely possible?
SharePoint Deployment and Governance Using COBIT 4.1
This session will provide and overview and walkthrough of SharePoint Deployment and Governance Using COBIT 4.1. This course will heavily use the COBIT Scorecard from the SharePoint-COBIT Scorecard from the book, "SharePoint Deployment and Governance Using COBIT 4.1: A Practical Approach" by Dave Chennault and Chuck Strain, ISACA 2010.
We will review the SharePoint-COBIT Scorecard which covers everything from the scope and planning phase, to post deployment and sustainment activities. The SharePoint-COBIT Scorecard is built within the context of planning for; Workflow, Monitoring, Permission Management and Configuration Management Tools Antivirus Protection, Migration and Integration Tools, and Rights Management and Backup Tools
Florida Coastal School of Law
Department of Homeland Security
In 2009, President Obama recognized the need to increase education and dialogue about cybersecurity and issued the Cyberspace Policy Review, which has become the blueprint from which our Nation's cybersecurity foundation will transform into an assured and resilient digital infrastructure for the future. As part of this policy review, the Department of Homeland Security (DHS) was asked to create an ongoing cybersecurity awareness campaign "Stop.Think.Connect." to help Americans understand the risks that come with being online. The Campaign aims at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. Stop.Think.Connect. challenges the American public to be more vigilant about practicing safe online habits.
DHS also sponsors the National Cybersecurity Awareness Month (NCSAM) Month, which engages public and private sector partners to raise awareness and educate Americans about cybersecurity, and increase the resiliency of the Nation and its cyber infrastructure. Since 2004, NCSAM has guided the Nation to an increased understanding of the threats we face online. As these threats continue to grow, it is important to remember that cybersecurity is a shared responsibility at home, in the workplace, and in our communities.
Mr. McKinney has served in several capacities since his arrival to DHS in 2004 and is currently the Director of Operational Integration and Outreach collaborating with federal, public and private sector and international partners in developing efforts for information sharing and stakeholder engagement. Mr. McKinney previously served as the DHS representative to The Office of Director of National Intelligence on a Joint Interagency Task Force. He has also served in the capacity of Acting Director for the Global Cyber Security Management program (GCSM) of the Department of Homeland Security, National Cyber Security Division, overseeing mission critical support functions in protecting the nation's Critical Infrastructure through Cyber Security Education and Workforce Development, Software Assurance, Standards and Best Practices, and Supply Chain. Mr. McKinney also served as Chief of Staff for the United States Computer Emergency Readiness Team (US-CERT).
Prior to joining DHS Mr. McKinney held various cyber security positions with the Federal Bureau of Investigation (FBI), the Defense Intelligence Agency (DIA), and The Department of Defense Joint Task Force Global Network Operations (JTFGNO). Mr. McKinney's public service also includes more than 20 years with the US Army.
Mr. Rostern has more than 29 years of diverse experience in audit, information security and technology. He has led the practice in delivering compliance services in areas such as the Gramm-Leach Bliley Act (GLBA), Sarbanes-Oxley, Health Information Technology for Economic and Clinical Health (HITECH) act and the Payment Card Industry Data Security Standard (PCI DSS).
His areas of expertise include IT audit, technology risk assessment & management, IT strategic planning & governance, architecture, information security, operations, applications development, telecommunications, networking, data center design and business continuity planning.
Mr. Rostern is a subject matter expert in the areas of data loss prevention, intrusion detection, encryption and incident response.
University of Central Florida
Check Point Software Technologies
Stuxnet: How to take over a Nuclear Power Plant
A detailed analysis of the stuxnet virus. Check Point's malware researchers were called into action to analyze the virus when it was found several months ago by a small Russian company.
Macy Torrey is currently a Channel Manager with Check Point Software Technologies covering the Orlando, Daytona Beach, and Jacksonville metro areas.
Macy has over 15 years of experience in IT security. He started at Check Point in 2004 as a Security Engineer covering Florida and the Caribbean. He specialized in Check Point's high-end product lines including VSX (Virtual Firewall Platform) and Provider-1 (Multi-Domain Management) platforms.
Before moving to Florida, Macy worked at US Sprint as a Managed Security Services engineer for over eight years assisting some of the largest companies in the world with managed firewall and IDS services. Macy served for eight years in the US Navy in the Cryptology field.
Network Packet Analysis
Understanding your network is a first and critical step in detecting and preventing intrusions. In particular, the relatively new field of network forensics attempts to reconstruct events based on network packet captures, which may reveal data no longer recoverable from the compromised disk. This presentation will discuss basic network traffic "file carving" techniques. We will go over some covert channel techniques that do not leave any artifacts on the victims file system, and how to detect them and reconstruct payloads. In the second half we will enter the new world of IPv6 and show how various tunneling mechanisms that are used by hosts to connect to IPv6 networks can be used. The presentation will include a large number of demonstrations and traffic samples as well as some tools and scripts will be made available to participants. Don't forget your laptop to fully participate in these great learning events.
Copyright © 2012 University of North Florida1 UNF Drive | Jacksonville, FL 32224 | Phone: (904) 620-1000
Contact | Emergency | Privacy | RegulationsDisability Accommodations