ForenSecure: Cyber Forensics and Security Conference at IIT – a Huge Success!

April 29, 2015 author: No comments

More than 220 cyber security professionals participated in ForenSecure ’15: Cyber Forensics and Security Conference and Expo at Illinois Institute of Technology’s Rice Campus in Wheaton. In its 13th year, this industry-focused technical conference attracted representatives from Google, the Federal Bureau of Investigation (FBI), Exelon, Cisco, Verizon, Comcast, Allstate Insurance, Argonne National Laboratory, Booz Allen Hamilton, CDW, Chicago Public Schools, CNA Insurance, Fermilab, Ford Motor Company, Motorola Solutions, Navistar, U.S. Marines, and Alcatel-Lucent. Universities such as Boston University, University of Chicago, University of Illinois at Chicago, Loyola University, Lewis University, Northern Illinois University, Wheaton College, University of Wisconsin, University of Dubuque (Iowa) and several community colleges, and other organizations were also represented.

This multi-tracked conference included discussion and debate by local, regional, national, and international organizations and universities over cyber security, forensics, data/information governance, cyber crime, cyber security legislation and legal issues, ethical hacking, eDiscovery, cloud forensics, steganography, policy and compliance, privacy, wireless security, cloud computing, credit card fraud, drones, identity theft, and more.

William Lidinsky, director, School of Applied Technology Computer Security and Forensics Laboratory; interim director, Center for Cyber Security and Forensics Education; and industry professor of Information Technology and Management headed up the conference with co-chairs, Ben Khodja (ITM ’12,  M.S. CYF ’15) and Yalinne Castelan Guzman (ITM, M.S. CYF ’16).

Several IIT faculty presented at conference sessions including Mohammad Shahidehpour, Bodine Chair professor of electrical and computer engineering; Henry Perritt Jr, professor of law; Ray Trygstad, director of information technology at IIT School of Applied Technology; and Adam Rouse, legal fellow for the Institute of Science, Law, and Technology at IIT Chicago-Kent College of Law; Bonnie Goins and William Slater III, adjunct industry professors of information technology and management;.

Student presentations from Lidinsky’s ITMS 448/548-Cyber Security Technologies, ITMS 539-Steganography, and ITMS 549-Cyber Security Technologies: Projects & Advanced Methods courses were featured both days. Presentations included various forms of steganography, how to defend Android apps, RADISH (Remotely-Accessible Dynamic Infrastructure for Students to Hack) developed at IIT, and more.

More information about ForenSecure: Cyber Forensics & Security Conference & Expo

More Information about Cyber Forensics and Securiey Lab at Illinois Institute of Technology School of Applied Technology

Categories: Uncategorized Tags:

ABC7 reporter, Chuck Goudie, interviews School of Applied Technology Associate Professor Jeremy Hajek about the issues of digital age tornado notifications

April 28, 2015 author: No comments

Tornado warnings have traditionally relied on a siren system that was designed 50 years ago. In this digital age, the ABC7 I-Team investigates how people will be informed of a coming tornado, who pushes the button to activate digital warnings and what happens to those people not plugged in.

See the the ABC7 video and/or article

Categories: Academic, Mobile Devices Tags:

IIT Real-Time Communications (RTC) Projects Presentations

April 14, 2015 author: No comments

See ITM student presentations, demonstrations and poster sessions on Wednesday, April 29 from 5:30-8:30 PM. Free

Presentations include:

  • Indoor Location for NG911
  • NG9-1-1 test beds
  • The Gateway Project
  • SIP Registration Rates
  • Voice over IIT at Main Campus

See details

Register

Congratulations to ITM Undergraduate Student Eric Tendian

April 6, 2015 author: No comments

Eric Tendian has been selected to attend on behalf of College Founders, the VIP special event to teach students about building their legacy. A small group of students (listed below) will sit down with Pete Kadens, Co-founder & President of SoCore Energy, for a private conversation on what it means to think long-term and build their legacy, not just professionally, but also personally.

The following IIT students were chosen to participate in the Future Founders VIP event:

Bart Grabowski (SSB)
Jong Massaquoi (SSB)
Eric Tendian (SAT)
Sunny Shah (LC)
James Mwakichako (CS)

Event details:
Wednesday, April 8
4-5PM
Located at SoCore Energy, 225 W. Hubbard, Suite 200, Chicago

Categories: Entrepreneurship, Innovation Tags:

FOX 32 Chicago News interviews ITM’s Jeremy Hajek regarding fob dead zone

April 1, 2015 author: No comments

School of Applied Technology Associate Professor Jeremy Hajek is interviewed on FOX 32 Chicago News about the possible causes of a key fob dead zone in Chicago.

See the video

Categories: Uncategorized Tags:

ITM Curriculum Revisions Approved

March 27, 2015 author: No comments

Fall 2015 will bring some changes to the ITM curriculum. ITMD 461, Internet Technologies and Web Design will be replaced by ITMD 361, Fundamentals of Web Development. The content of the course is essentially unchanged, but the new title and course description reflects the fact that the extended discussions of Internet technologies and design that were originally included in the course are no longer covered.  The design component will move to another new course, ITMD 362, Human-Computer Interaction and Web Design, which will replace ITMD 434, Human-Computer Interaction. This restores the Web design component formerly included in ITMD 461, moves the HCI component formerly in ITMD 434 from a full semester to 9 weeks, and allows students to apply their new HCI knowledge through hands-on project-based learning. The first offering of ITMD 362 is planned for Spring 2016.

Additionally two new minors are offered in ITM to prepare students in other majors to be admitted to our graduate programs. The Information Technology Foundations minor prepares students to enter the Master of Information Technology and Management degree, and the Cyber Security Foundations minor will prepare students to enter the Master of Cyber Forensics and Security degree. The existing minor in Information System Administration has had a major revision to incorporate current courses and is now one of our strongest minors. Let your friends in other majors know about these!

See the Curriculum Revision document for full details!

Automated Drone presentation by Jeremy Hajek and Mark Milhouse

March 18, 2015 author: No comments

Jeremy Hajek, ITM Industry Associate Professor, and ITM student Mark Milhouse spoke at the 25th Annual DePaul Law Review Symposium “The UAS Dilemma: Unlimited Potential, Unresolved Concerns”, on their Automated Drone. They discussed the IT and technical challenges of an automated drone.

See the presentation > >

Dean’s article appears in the International Journal of Innovation Science

March 17, 2015 author: No comments

The article titled “Exploiting Intellectual Capital for Economic Renewal” was written by Dr. C. Robert Carlson, Dean of the School of Applied Technology, former ITM professor Praveen Gupta, and Helena Santos Rodrigues. It appears in the International Journal of Innovation Science Volume 7 –Number 1 – 2015. The study proposes a model to analyze the relationship between leadership, intellectual capital (human, structural, and relational), and their contribution to economic renewal.

See the article abstract

Categories: Academic, Innovation, Research Tags:

ITM Faculty and Student to Show Their Automated Drone

February 25, 2015 author: Comments off

Jeremy Hajek, ITM Industry Associate Professor, and ITM student Mark Milhouse will be showing their automated drone and will discuss the technical challenges at the 25th Annual DePaul Law Review Symposium.

Learn more > >

ITM’s Jeremy Hajek quoted in Security Sales & Integration magazine

February 25, 2015 author: Comments off

Jeremy Hajek’s, Industry Associate Professor of Information Technology and Management, comments appear in the article “Home Security Systems, Peripherals Said to Be Vulnerable to Hacking” in Security Sales & Integration magazine.

Learn more

Categories: Research, Security Tags: , ,