People, Process, and Technology Confidentiality, Integrity, and ...

Report 4 Downloads 32 Views
2000 M Street NW, Suite 500 Washington, D.C. 20036 Phone: 202.601.1222 │ Email: [email protected] Fax: 202.370.9558 WWW.NATIONALCYBERSECURITYINSTITUTE.ORG

People, Process, and Technology Confidentiality, Integrity, and Availability Authentication Layered Security Social Engineering Backups Encryption Risk Assessment Computer Forensics Zero-day Attacks Passwords Disaster Recovery and Business Continuity Baselining Penetration Testing The Cloud Access Control The Principle of Least Privilege Separation of Duties Honeypots Physical Security Insider versus Outsider Threats Virtualization Security

There will be 7 security Sudoku puzzles to solve, one for each day between October 1 and October 9. Unlike ordinary Sudoku, where the numbers 1 through 9 must be filled in, Security Sudoku requires the nine letters from the word AUTHORIZE to be filled in. Each day there will be a new puzzle provided along with the solution to the previous day’s puzzle.

There will be 5 cryptographic challenges, one for each day between October 12 and October 16. Each challenge will present a short encrypted text message that must be cracked using one of several different techniques, such as Caesar shift, transposition, and substitution. Each day there will be a new challenge provided along with the solution to the previous day’s challenge.

There will be 5 phishing challenges, one for each day between October 19 and October 23. Each challenge will present one or more email messages, one of which is a phishing attempt, which must be identified using logic. Each day there will be a new challenge provided along with the solution to the previous day’s challenge.

There will be 5 steganography challenges, one for each day between October 26 and October 30. Each challenge will present a hidden message that must be discovered using one of several different techniques, such as pattern recognition or examination with a hexadecimal viewer. These challenges will be the most technical. Each day there will be a new challenge provided along with the solution to the previous day’s challenge.

: Social Engineering and Insider Threat : Cyber Crime Breaches and the Deep Dark Web : Cybersecurity Attacks by Nation States : Hactivist Cyber Breach Operations for Social Change

Location: National Cybersecurity Institute 2000 M St., Suite 500 Washington, D.C. 20036 8:30 - 8:50 AM Networking & Refreshments 8:50 - 9:00 AM Welcome & Introduction Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute 9:00 - 9:15 AM Keynote Address Dr. Ernest McDuffie, Founder & CEO The Global McDuffie Group (TGMG) National Cybersecurity Institute Advisory Board Chair 9:15 - 10:00 AM Cybersecurity: Risks & Responses - Protecting Yourself from the Inevitable Lisa Lori Esq., Partner Klehr Harrison Harvey Branzberg LLP 10:00 - 10:45 AM Cyber Liability Insurance: What's Your Escape Plan? Steve Lobel, Vice President Anchor Agency, Inc. 10:45 – 11:00 AM Q & A and Open House