Come join us for our weekly ACM SIG-Security meeting! We talk about a variety of interesting security related subjects, provide beginner/medium/advanced level training, and get up to our elbows in hands-on activities. Here's what is on the agenda this Friday:
Friday Feb. 9, 2018
- CTF Training by Dr. Taylor
- Problems worked out together as a team
By William Atkins - Technical Staff at Sandia National Laboratories
CS Building 207, February 14 2018, 7:00pm till end
Bio: William Atkins is a Principal Member of Technical Staff at Sandia National Laboratories, where he conducts cybersecurity research and development, performs assessments of US Government and private sector systems, and designs and tests secure system architectures.
Wil joined Sandia in 2007 after completing bachelors and masters degrees in computer engineering at the University of Missouri-Rolla, now the Missouri University of Science and Technology. His professional interests include network design, adversary-based security assessment, and Linux systems development.
Abstract: In addition to size and complexity, the criticality of enterprise networks has grown dramatically in the past decade. This talk discusses the theory and practice of assessing the security of such sprawling networks, and provides demonstrations of real-world tools and techniques.
By Chris Rawlings - Researcher at Los Alamos National Laboratories
CS Building 207, March 1 2018, 7:00pm - 8:30pm
Bio: Chris Rawlings recently graduated from Missouri S&T with dual BS degrees from the Computer Engineering and Computer Science Departments.
As a scientist and engineer, Chris' expertise is in network architecture and security, systems design and architecture, security engineering, and outreach and education. For the past two years, Chris has run Cyber Fire, a week-long cyber security training program held in Washington D.C., Las Vegas, Denver, and San Diego that is attended by several hundred people. Currently, Chris is one of the instructors for LANL's cyber security summer school program.
Abstract: Wi-Fi, once a coveted commodity, has become ubiquitous in our everyday lives while at home, school, work, and etc. This talk discusses violating the inherent trust of wireless, leveraging that broken trust as an adversary, and demonstrations of tools and techniques.