Cyber Security Awareness | Office of Information Technology
IRM Home Security Home | About Us Policies FAQs How to Protect Yourself Events External Links
National Cyber Security Awareness Month
October 2012
October 2012 has been designated National Cyber Security Awareness Month (NCSAM) by the National Cyber Security Alliance (NCSA), a consortium consisting of the U.S. Department of Homeland Security (DHS) and partners from Federal, State and local government,  academia and industry.
 
 The NCSAM program here at FAU will focus on educating our Students, Faculty, Staff and the public about how to secure their parts of Cyberspace, their Desktop, Mobile, laptop and tablet computers.
As part of the nationwide NCSAM effort, The Office of Information Technology (OIT) is sponsoring cyber security events at FAU throughout October, including a series of informative presentations by industry experts.  The Presentations will be held at our Boca Raton campuses and are open to the public.   All events will be video-conferenced from Boca Raton (see individual events below for orginating rooms), and shown in Davie (LA139), Jupiter (SR200), Fort Lauderdale (HE608) and HBOI (HB105). For more information please contact Larry Thomas, 561-297-3259, lthomas@fau.edu  or go to our web site at www.fau.edu/security   

October 1, 2012         10:30am          Room OD203

Dan Mathews, Dell/Secureworks

Threats and Vulnerabilities

Abstract:  The speaker will cover the mobile threatscape updates from the Counter Threat Unit (CTU).  The State of mobile malware, trends and  attacks will also be discussed.  He will also go over specific attack/compromised examples with the audience participation. 


October 2, 2012         10:30am          Room OD203

Bob Demmery, Sprint

Mobile Security

Abstract:  As an industry,  carriers have noticed an increase of customer’s reporting devices have been infected with Malware.  The purpose of the presentation is to raise awareness and provide actionable steps to protect your personal and business information on your mobile devices. 


October 10, 2012       10:30am          Room CM133

Jason Wright, Sourcefire

Agile Security in a Dynamic World

Abstract:  Security is a moving target.  The amount of change occuring daily on today’s networks from BYOD devices, new applications, and remote users demands that your security solutions to change with the network composition.  And as if the dynamic network wasn’t enough to contend with, the threats are changing as well.  Polymorphism and zero-day exploitation by new strains of malware will grow significantly in 2013; so how do we stop what we’ve never seen before? 


October 15, 2012       10:30am          Room OD203

Mike Scanlin, NetApp

Title: Assuring Confidentiality, Integrity and Availability with the NIST Risk Management Framework

Abstract:  While cybersecurity awareness is deemed an essential element of U.S. national strategy aimed at reducing vulnerability to cyber‐attack, we lack a shared definition and understanding of the term cybersecurity. This presentation promotes the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) as a way all organizations can understand and achieve the core tenets of cybersecurity (i.e., confidentiality, integrity, and availability). By holistically integrating people, process, and technology, the NIST RMF enables organizations to achieve information assurance consistent with mission and risk management objectives. 


October 17, 2012       09:30am          Room OD203

William Chip Crane, IBM

Title: Understanding the security challenges to cloud computing

Abstract:  Cloud computing is offering businesses new dynamic ways to implement their IT infrastructure that can provide more cost effective ways to serve their customers. It has revolutionized the way many companies operate as it can provide faster routes to market, faster implementation of new business concepts as well as improve reliability.  However, one of the greatest challenges seen by the world's CIOs and CSOs is how to keep it secure. Once this mission critical infrastructure is in place and providing customer facing services, how can the CSO ensure that customer data is protected and both risk to the customer and the business are mitigated.  Find out the challenges that face the CIO and CSO and what are the steps to solving them. 


October 24, 2012       09:30am          Room CM125

Patrick Gray, CISCO

Title: The Confluence of Data Security Challenges

Abstract:  The Speaker will cover the cresting Waves that are engulfing users and security professionals, the BYOD phenomenon and current threats and vulnerabilities around the world.

What has changed in the Hacktivism community is that these individuals and groups are more in sync with their cohorts in the organized crime community in that they not only hack for the sake of hacking an entity that has run afoul of their beliefs but also for monetary gain and these groups, such as Anonymous and LulzSec seem to target anyone who ends up on their radar such as the Australian Government, numerous Chinese Government sites, Stratfor, the CIA, the FTC and many more.

Add to this three-pronged assault on our  livelihood the fact that we are engaged in three separate and distinct confluences – mobility, collaboration and the virtualization of our environments.  All three of these seem to be cascading at once quite often beleaguering our IT staffs as they try to cope with a train that is traveling at full speed.  We’re dealing with BYOD, gravitating into the cloud and wondering about hypervisor attacks.  How can I be confident that data center operations are sound?

So, we are in the midst of this confluence so where do we turn? 


October 29, 2012       10:30am          Room OD203

Rolando Panez, CheckPoint Software Technologies

Title: Dissecting Four Major Cyber Attacks of 2011

Abstract:  Discussion of four major cyber-attacks that occurred in 2011.  Specifically Operation Shady Rat which attacked over 70 victims in 14 countries, was considered state-driven industrial espionage and occurred over a 5 year span.  RSA hack which was used in two others attacks at L3 and Lockheed Martin.  HB Gary attack made by the online activist group Anonymous.  Sony breach which is considered the 4th largest attack ever in terms of records lost.

Privacy Policy | University Regulations and Policies | Emergency Information | Get Help | Contact Us

An Equal Opportunity/Equal Access Institution
© Copyright 2014. Florida Atlantic University.
Florida Atlantic University
 Last Modified 10/3/12