7:45-8:45 AM |
Registration, Meet and Greet, Student Poster Set-Up, and Breakfast |
8:45-9:00 AM |
Introduction by Dr. Amruthur Narasimhan, CISSP, Conference Chair |
Biography |
|
9:00-10:00 AM |
Keynote Speaker: Dr. Gus de los Reyes, AT&T Chief Security Officer, R&D |
Wanted: A Revolution in Security Research |
Abstract Biography |
|
10:00-11:30 AM |
Talks on Information Security and Privacy Topics from Industry Representatives |
— The Invisible Threat of Modern Malware, by Lee Gitzes, Comm Solutions |
Abstract Biography |
— Mobile Devices-The Insider Threat to Cyber Security in Secure Facilities, Scott N. Schober, Berkeley Varitronics Systems, Inc. |
Abstract Biography |
— Critical Considerations in Choosing a Network Firewall, Sean McCarthy, Barracuda Networks & Promedia Technology Services, Inc. |
Abstract Biography |
|
11:30 AM-12:30 PM |
Keynote Speaker: Dr. Peter Fonash, CTO Office of Cybersecurity and Communications, Department of Homeland Security |
Strengthening the cyber ecosystem |
Abstract Biography |
|
12:30-1:15 PM |
Lunch & Table Presentations from Industry Representatives |
1:15-2:15 PM |
Keynote Speaker: Mr. Jimmy Tsang, Director of Product, IBM |
The Quest for Nirvana: Balancing Mobile Security with User Productivity |
Abstract Biography |
|
2:15-2:45 PM |
|
2:45-3:15 PM |
Threat Prevention Solutions: Jeffrey Schwartz, Checkpoint Software Technologies |
|
|
3:15 -3:30 PM |
Discussion, Coffee Break, and Table Presentations |
3:30-4:15 PM |
Detecting Lies on the Internet: Prof. K.P. Subbalakshmi, Stevens Institute of Technology |
Abstract Biography |
|
4:15-5:15 PM |
Talks on Information Security and Privacy Topics- Presentations from Industry Representatives |
— Risk Assessment of 3rd Party Service Providers, by Dominic Genzano, Stig.net |
Abstract Biography |
— UEFI system firmware, secure boot and the current attack landscape in the
pre-OS environment, by Dick Wilkins, Assoc. Prof. Comp. Sci., Thomas College, Maine |
Abstract Biography |
|
5:15 PM |
Concluding Remarks, Prizes, and Awards |