Archive

Posts Tagged ‘security’

Conference Week for ITM

October 4th, 2017 Comments off

The ITM Department Office will be closed on and off this week, because nearly everyone who works there will be away at conferences.

Amber Chatellier and Angela Jarka are representing the 2018 Women in Cyber Security (WiCyS) Conference at the Grace Hopper Celebration in Orlando, FL, sponsored by the Anita Borg Institute. Named for computing pioneer and U.S. Navy Admiral Grace Hopper, the celebration is the world’s largest gathering of women technologists, with over 18,000 in attendance this year. As the hosting Logistics Committee for WiCyS, Amber and Angela will be seeing sponsors and potential attendees for the WiCyS Conference to be held at the Hilton Chicago March 23rd and 24th, 2018.

ITM Associate Chair Industry Professor Ray Trygstad, Industry Associate Professor Jeremy Hajek, and Senior Lecturer Dr. Yong Zheng will represent Illinois Tech at the 2017 ACM Special Interest Group in Information Technology Education (SIGITE)/Research in Information Technology (RIIT) Conference in Rochester, NY. Ray is a member of the ACM SIGITE Executive Committee and will represent the School of Applied Technology as a Gold Sponsor of the conference. Jeremy and Yong will present papers co-authored with ITM students at the RIIT Conference.

Categories: Academic Tags: , ,

ITM Department and C2SAFE to host Women in Cyber Security 2018

October 4th, 2017 Comments off

The Department of Information Technology and Management and the Center for Cyber Security and Forensics Education are pleased to announce that we will host the Fifth Annual Women in Cyber Security (WiCyS) Conference. This National Science Foundation funded event will be held March 23 through March 24, 2018 at the Hilton Chicago. It is the mission of WiCyS to bring together women in cybersecurity from academia, research and industry from across the United States. The event is exclusively designed as the forum for speakers and guests to exchange knowledge, experience, networking, and mentoring to raise interest in the field of cybersecurity. We will be seeking volunteers to assist with the conference and to meet arriving delegates at the airports later this fall.

ITM Associate Chair Ray Trygstad will serve as conference co-chair, while Amber Chatellier and Angela Jarka of the ITM Department comprise the conference logistics staff.

New New York regulations will drive cybersecurity advances

September 27th, 2017 Comments off

New regulations on cybersecurity have been published by the New York State Department of Financial Services. 23 NYCRR Part 500 will have a major impact on American business as it has serious requirements and mandates for all financial services companies doing business in New York state–which of course are almost all of them. A good article on the topic is is at https://digitalguardian.com/blog/what-nydfs-cybersecurity-regulation-new-cybersecurity-compliance-requirement-financial. Significant requirements include:

  • Policy & Program: Covered entities must instate and maintain a documented cybersecurity policy, and adopt a robust cybersecurity program, by August 28, 2017.
  • CISO: Designate a qualified Chief Information Security Officer (CISO) to oversee and implement the cybersecurity program and enforce policy.
    • The CISO must submit a written report annually to the Board of Directors and an annual compliance certification to the Department of Financial Services.
  • Data encryption: Organizations must enact controls, including encryption of sensitive data, depending on the outcome of a risk assessment.
  • Continuous monitoring: Covered entities must continuously monitor cybersecurity functionality OR conduct annual penetration testing and bi-annual assessments.
  • Enhanced multi-factor authentication: Covered institutions must employ multi-factor authentication for all inbound connections to the entity’s network.
  • Incident reporting: Covered entities must document and report all cybersecurity events.

How much do you know about cybersecurity?

August 31st, 2017 Comments off

PEW quiz header
Take the Cybersecurity Knowledge Quiz from Pew Research! Then see how you did in comparison with a nationally representative group of 1,055 randomly selected adult internet users surveyed online between June 17 and June 27, 2016.
http://www.pewinternet.org/quiz/cybersecurity-knowledge/

Categories: Security Tags: ,

Cybersecurity Scholarships from (ISC)²’s Center for Cyber Safety and Education

January 3rd, 2017 Comments off

Graduate, undergraduate, and women’s scholarships are offered by the Center for Cyber Safety and Education of the International Information System Security Certification Consortium (ISC)². They will begin accepting applications on February 28, 2017 for graduate and undergraduate scholarships of up to $5,000, and are currently accepting applications for women’s scholarships of $8,000 or more. One undergraduate student may also be selected for the Harold F. Tipton Memorial Scholarship; the most recent award recipient for this scholarship is Kyle Dean Murbach from Wheaton, IL. Please see the (ISC)² scholarship page at https://www.isc2cares.org/Scholarships/ for full details.

ACM RIIT 2016 Best Paper Award earned for ITM research by Anthony Ramirez and Alfredo Fernandez

September 29th, 2016 Comments off

Anthony and RayITM is happy to be in Boston! In the photo at right, Master of Cyber Forensics and Security alumnus Anthony Ramirez receives the Best Paper Award for the 2016 ACM Research in Information Technology (RIIT) conference in Boston. Anthony and Alfedo Fernandez earned this award for their paper MP3 Stegonography: Analyzing and Detecting TCSteg. This is the third time in five years that Illinois Tech Information Technology and Management researchers have received this award. The School of Applied Technology and the ITM Department are Silver Sponsors for the RIIT conference and the concurrent ACM Special Interest Group in Information Technology Education (SIGITE) conference. ITM Associate Chair Ray Trygstad serves on the SIGITE Executive Committee.

ITM’s Jeremy Hajek quoted in Security Sales & Integration magazine

February 25th, 2015 Comments off

Jeremy Hajek’s, Industry Associate Professor of Information Technology and Management, comments appear in the article “Home Security Systems, Peripherals Said to Be Vulnerable to Hacking” in Security Sales & Integration magazine.

Learn more

Categories: Research, Security Tags: , ,

ITM Professor Louis McHugh Interviewed for Channel 2 News

January 15th, 2015 Comments off

CBS Chicago Channel 2 News (WBBM) interviewed ITM Professor Louis McHugh for a story “ATM App Is Convenient, But Is It Secure?” about the security of ATM applications for mobile devices.

See the video

WGN Television Interviews ITM’s Ray Trygstad

December 19th, 2014 Comments off

Ray Trygstad, ITM Associate Chair, Director of IT and Industry Professor, appeared on WGN News on Thursday, December 18. Professor Trygstad was interviewed for a story on the Sony Pictures cyber attack and the precedent they set by pulling the movie “The Interview.”

See the video (Professor Trygstad appears at the 1:41 mark)

Master’s Degree in Cyber Forensics and Security at IIT

May 14th, 2012 Comments off

Illinois Institute of Technology Announces Master’s Degree in Cyber Forensics and Security
New Program Combines Technical, Legal, Policy and Compliance
In 2011, the average organizational cost of a data security breach in the U.S. was $5.5 million according to a report from Symantec and the Ponemon Institute. Cyber forensics continues to be used to recover evidence from security breaches. Cyber security and forensics issues have become increasingly complicated with technical, legal, policy, and compliance issues, and with such astronomical costs, there is a critical need in both the government and private sectors for professionals equipped to prevent, counteract and investigate cyber terrorism, cybercrimes and information security breaches.

To address these issues, Illinois Institute of Technology’s School of Applied Technology is offering a Master of Cyber Forensics and Security degree and graduate certificate programs in cyber security management and cyber security technologies, starting in fall of 2012. The program integrates legal courses from IIT Chicago-Kent College of Law curriculum and technical and managerial courses from IIT School of Applied Technology’s information technology and management curriculum. The program provides cyber security and forensics practitioners a thorough grounding in technology, legal issues, policy and compliance, providing an outstanding curriculum for those interested in cyber forensics and security and is a substantive follow-up degree for undergraduates majoring in information technology and management, computer science, computer information systems, or computer engineering.

The mission of the cyber forensics and security programs is to prepare students to assume technical and managerial leadership in information technology and cyber security. With a hands-on, reality-based approach to education, the cyber forensics and security program allows students to apply what they learn in class to solve real-life problems. Additional courses may be taken from the IIT Chicago-Kent College of Law curriculum to give cyber security and forensics practitioners a thorough grounding in legal issues and compliance.

“The program provides an innovative experience where cyber forensics and security students work on cutting-edge, industry-sponsored projects that deal with technical, legal, policy and compliance,” said IIT School of Applied Technology Dean Robert Carlson. “This teaching philosophy prepares students to become innovators, entrepreneurs and leaders of the future.”

Recognized by industry professionals as a premier curriculum, IIT’s Cyber Forensics and Security (ForSec) programs are project-based and students are immersed in solving real problems, using current technologies and industry practices, while being guided by experienced faculty.

“In the IIT ForSec Lab, students use real computer viruses to learn and experience how they work, and also devise methods for protection of computers and mobile devices,” explains Professor Bill Lidinsky, director of security and forensics. “In cyber forensics, students learn how to accurately and legally access and analyze computers and cell phones, searching for evidence such as hidden and deleted files, email sent and received and web pages visited.” Students also do cutting edge research and present findings to their peers and leading professionals in their fields. This approach provides students with relevant experience — publishing and presenting at conferences, in some cases for government organizations such as the FBI.

For additional information regarding the Cyber Forensics and Security programs please visit www.itm.iit.edu/cybersecurity.

To help launch the program, Illinois Institute of Technology is hosted ForenSecure: the IIT Cyber Forensics and Security Conference on April 19 and 20. The conference had speakers from the Federal Bureau of Investigation (FBI) and the Chief Cyber Security Advisor from the Illinois Terrorism Task Force. For additional information about the conference please visit www.cpd.iit.edu/forensecure.

About IIT
Founded in 1890, IIT is a Ph.D.-granting university with more than 7,700 students in engineering, sciences, architecture, psychology, design, humanities, business and law. IIT’s interprofessional, technology-focused curriculum is designed to advance knowledge through research and scholarship, to cultivate invention improving the human condition, and to prepare students from throughout the world for a life of professional achievement, service to society, and individual fulfillment. Visit www.iit.edu.