Workshops @Conference 2015

Space is limited in these free of cost workshop opportunities for WiCyS 2015 attendees.
So, please apply early HERE.

One can apply to multiple workshops as long as timing does not conflict and space is available.
Workshop applications are now closed. Notifications will go out February 22nd.


Discovering Cybersecurity


Target Audience: Students
Workshop Organizer: Jackson State Community College
Stipend/Incentive: $100 (Payable only to US Residents or Citizens).
Time: 10:30-12:30 PM March 27
Special Skills Required: None
Laptop Requirements: A laptop will be provided.

This workshop is intended to introduce participants to the field of cybersecurity and opportunities within. It will focus on engaging participants in hands on activities so that participants catch a glimpse of typical responsibilities held by a security.


Introduction to Digital Forensics in the IoT (Internet of Things)


Target Audience: Faculty
Workshop Organizer: TRUST Center, University of California, Berkeley
Stipend/Incentive: Drawing of Digital Forensics books
Time: 10:30-12:30 PM March 27
Special Skills Required: None
Laptop Requirements: WiFi Capable laptop.

Digital Forensics has grown in the new millennium to keep pace with technology. Deleted files, deleted emails, instant messaging, encrypted files? How does one deal with this? This introductory hands-on workshop in digital forensics sponsored by the TRUST Center. You will learn what can and cannot be retrieved, where to look and be introduced to a popular forensics tool. In the IoT, we no longer are just looking at static hard drives, but smart phones, smart rings, social media, the cloud and more. This workshop will be led by Amelia Phillips one of the leading authors in the field. We will help you understand the basics of digital forensics as well as provide best practices to begin to teach these tools to your students.


Network Packet Analysis


Target Audience: Professionals/Faculty/Students
Workshop Organizer: Women’s Society of Cyberjutsu
Stipend/Incentive: None.
Time: 10:30-12:30 PM March 27
Special Skills Required: None
Laptop Requirements: WiFi Capable laptop.

Wireshark is a very powerful and popular network analyzer for Windows, Mac and Linux. It’s a tool often used by Network/security engineers to troubleshoot network/security problems. In this workshop, we will introduce the tool and the interface, basic usage and file carving. We will conclude with performing forensic analysis of output files from a Wireshark capture. You will leave this workshop with a foundation of how to use Wireshark and build upon this skill.


Using RAVE to Encourage GenCyber Outreach


Target Audience: Faculty
Workshop Organizer: University of Alaska, Fairbanks and National Security Agency
Stipend/Incentive: None.
Time: 4:00-5:30 PM March 27
Special Skills Required: None
Laptop Requirements: WiFi Capable laptop.

This workshop will provide you with hands-on experience using the Remotely Accessible Virtualized Environment (RAVE) for cybersecurity exercises. The RAVE environment is available for faculty around the US to use in their courses at no cost to provide the valuable hands-on experiences associated with cybersecurity without the challenge of building scenarios and support platforms. RAVE has partnered with the federally funded GenCyber Program to provide funding for summer camps for high school students through the GenCyber Program with an emphasis on cybersecurity. In addition to learning how RAVE can be used in community college and university courses, participants will receive detailed information about the GenCyber Program and how to obtain funding through this program to promote cybersecurity education for high school teachers and students as well as the wealth of support available through RAVE to support these outreach programs.


A Walkthrough of Capture the Flag (CTF)


Target Audience: Students/Faculty
Workshop Organizer: Facebook Inc.
Stipend/Incentive: None.
Time: 2:00-4:00 PM March 28
Special Skills Required: None
Laptop Requirements: WiFi Capable laptop.

A Capture the Flag (CTF) is a computer security competition that encourages players to solve security puzzles in a safe and controlled environment. This workshop will provide guidance on how to play a CTF. CTFs typically consist of challenge “levels” that represent real security issues found in networks and systems. The players will compete with each other, often in teams, to see who can solve these levels first and thereby win valuable points to progress up a leader-board. Our goal is to expose players to the most common methods hackers use to break into systems, and then to think about how they would defend against these attacks.


Security Management in Product Lifecycle


Target Audience: Professionals, Advanced Students
Workshop Organizer: Adobe Systems, Inc.
Stipend/Incentive: None.
Time: 2:00-4:00 PM March 28
Special Skills Required: None
Laptop Requirements: WiFi Capable laptop.

The workshop will use real-world case studies from our experiences at Adobe as the foundation for learning how to manage security throughout the whole product lifecycle. The first half will discuss the best practices, processes, and tools used to help integrate security into the software development and deployment process. The second half will cover how to properly respond to and manage incidents that occur once the product is in customers’ hands and how to make sure that knowledge is funneled back into the development lifecycle.


CReST Workshop: Teaching Add-On Security Modules in Computing Curriculum


Target Audience: Faculty
Workshop Organizer: Towson and Tennessee Tech University
Stipend/Incentive: $150 (Payable only to US Residents or Citizens).
Time: 2:00-4:00 PM March 28
Laptop Requirements: WiFi Capable laptop with either Java, C++, Python, and VirtualBox

The ACM CS2013 curriculum includes Information Assurance and Security as a pervasive knowledge area. However, introducing security in computing curriculum is challenging because of lack of appropriate teaching resources and training. If you are a faculty member who is interested in incorporating security related lab assignments in your security or CS courses (C++, Java, Python programming and/or software engineering and/or networking and/or database and/or operating systems), this is the workshop for you! As part of the CReST project (CyberWorkshops: Resources and Strategies for Teaching Cybersecurity in Computer Science, NSF Award# 1438861), this workshop will introduce attendees to add-on security modules. We will show you how you can access and use freely available resources that have been developed under the Security Injections (NSF Award# 1438861) and Security Knitting Kit (NSF Award# 1140864) projects.

Women in Cybersecurity
© Copyright 2013 All Rights Reserved.

Site designed by Stephen Garrett
for Tennessee Tech University