Workshops @ WiCyS 2017

As a tradition, WiCyS will offer free of cost workshop opportunities for all 2017 attendees.
One can apply to multiple workshops as long as timings do not conflict and space is available.

As we have limited capacity, please secure your spot HERE today.


Before You CTF


Target Audience: Anyone
Workshop Organizer: Melanie Rich-Wittrig (Carnegie Mellon University) and Rashmi Venugopal (Carnegie Mellon University)
Stipend/Incentive: None
Time: 03/30   2 – 4 PM
Special Skills Required: None
Laptop Requirements: Bring your own

Capture the Flag (online hacking) competitions are one of the best ways to develop cybersecurity skills, but they can be very difficult to start without a certain background. The goal of this session is to cover recommended prerequisite skills such as cmdline navigation, LINUX utilities, network packet capture, and basic web-based exploits. For educators, tips for engaging their own students in CTFs will be included. Online resources like picoCTF that can be used for on demand practice will be introduced. Please bring a laptop as it is a hands-on workshop.


What Got You Here Won’t Get You There: Planning for the Next Step in Your Career


Target Audience: Anyone
Workshop Organizer: Ronda Henning (Harris Corporation)
Stipend/Incentive: None
Time: 03/30 2 – 4 PM
Special Skills Required: None
Laptop Requirements: None

To determine where a person is in their career, there are three points to triangulate a course: 1) Where you started. 2) Where you are 3) Where you wish to be. When you accept a new position, it is time to start planning for where you wish to be next, and how it relates to your end goal. This workshop covers strategies and steps to use your current position to plan for your future positions, and to help you determine what comes next in your career path. It builds on 30 years of cybersecurity experience both as a cyber professional and as a career mentor to define a roadmap for career growth and experience.


Introduction to Reverse Engineering (Part 1 and 2)


Target Audience: Anyone
Workshop Organizer: Madeline L. Stone (John Hopkins University Applied Physics Laboratory) and Amanda Rousseau (Endgame Inc.)
Stipend/Incentive: None
Time: 03/30 2 – 4 PM
Special Skills Required: Basic Programming Concepts in part 2
Laptop Requirements: Bring your own

The first hour of this workshop covers the basics of what reverse engineering is, important terms, and how it is used. Each attendee will work through hands-on exercises to become familiar with assembly and to identify a vulnerability. We will cover how hackers use this same process to develop exploits and how security researchers must do it to patch holes and defend systems. No experience or computer is required.

The second hour of this workshop provides the fundamentals of reversing engineering (RE) Windows malware using a hands-on experience with RE tools and techniques. Participants will be introduced to malware analysis terms, followed by reviewing RE tools and malware techniques. The workshop will conclude by participants performing a hands-on malware analysis that consists of Triage, Static, and Dynamic analysis. Basic understanding of programming C\C++, Python, or Java is required. A laptop with an OS that supports VirtualBox and wifi connection is required. A virtual machine and tools will be provided.


A Holistic Approach to CyberSecurity


Target Audience: Professionals
Workshop Organizer: Valecia Maclin, Director Cybersecurity & Special Missions Raytheon Company; Sheila Alvarez, IT Manager Raytheon Huntsville; Karen Livingston, Sr. Manager-System Administation, Network Engineering, Raytheon Integrated Defense Systems; Contessa Hoskin, Program Manager Raytheon IDS; Felicia Jackson, IT Security – Government Risk Raytheon Missile Systems
Stipend/Incentive: None
Time: 03/30 2 – 4 PM
Special Skills Required: None
Laptop Requirements: Bring your own

NOTE TITLE change as of 3-7-17. Was called Lessons-Learned Applying the NIST Risk Management Framework. NEW abstract is Cyber defense strategies begin at home with our personal devices, networks, and habits. They help us navigate through our daily lives using secure habits – and continue into our corporate offices, and our dynamic network landscapes. We will discuss risks and best practices that will give you a cradle to grave approach to Cyber Security, its effects and how to operate through the lens of Cyber Security Professionals.


NSF C5 Project: Applied Cryptography Learning Module for Computing Courses


Target Audience: Faculty
Workshop Organizer: Elizabeth Hawthorne (Union County College), Deanne Cranford-Wesley (Forsyth Technical Community College) and Yesem Peker (Columbus State University)
Stipend/Incentive: None
Time: 03/30 4:30 – 6:30 PM
Special Skills Required: None
Laptop Requirements: Bring your own

This workshop will provide an opportunity for faculty development on learning modules based on Applied Cryptography. Each learning module is 4 to 6 contact hours and designed for introductory computing courses. The cybersecurity modules align with various portions of three prominent curricular frameworks: 1) The College Board Advanced Placement Computer Science Principles (AP CSP) curriculum framework, 2) the NSA CAE2Y Knowledge Units, and 3) the Knowledge Areas of the ACM Computer Science Curricular Guidelines (CS2013). These modules were also designed to help community colleges meet the curriculum requirements for achieving the NSA/DHS designation as a Center of Academic Excellence in Cyber Defense for Two-Year Education (CAE2Y).


Dealing with Security in the Real World


Target Audience: Students
Workshop Organizer: Alejandra Quevedo (Facebook)
Stipend/Incentive: None.
Time: 03/30 4:30 – 6:30 PM
Special Skills Required: None
Laptop Requirements: Bring your own

Security has never been more important and old school approaches don’t always hack it. We must approach complex situations with critical thought, speed, and logic. This workshop will group participants with real world scenarios on prevention and detection with the goal of being able to identify risks and design solutions. Maximum capacity 86. Each participant will receive a FB Yubikey.


Igniting and Sustaining Interest in Cybersecurity among School Aged Youth through CyberPatriot


Target Audience: Anyone
Workshop Organizer: Dan Manson (Calpoly Pomona), Yenny Yi (UCLA Community Based Learning-OID), Allen Stubblefield (Troy High school) and Tamara Shoemaker (UDM Center for Cyber Security & Intel Studies)
Stipend/Incentive: None.
Time: 03/30 4:30 – 6:30 PM
Special Skills Required: None
Laptop Requirements: None

CyberPatriot is the nation’s largest and fastest growing youth cyber education program.  In addition to the National Youth Cyber Defense Competition, the program features AFA CyberCamps and AFA’s Elementary School Cyber Education Initiative. We will cover the history of CyberPatriot, how to get started with the program and sustain the program in school. Learn about resources to become an advocate for Cybersecurity in K-12.


Covert Communications: When your data grows legs and crawls out the airvent


Target Audience: Anyone
Workshop Organizer: Nicole Hands (Purdue University)
Stipend/Incentive: None.
Time: 03/30 4:30 – 6:30 PM
Special Skills Required: None
Laptop Requirements: None

Covert Channels come in many shapes and sizes and all have one purpose: to transfer data in a manner where one does not expect to see data being transferred. In the Age of the Data Breach, knowing where covert channels may exist can help professionals know when it’s appropriate to look for data to walk out the door, and when it might crawl out the airvent. This workshop will illuminate some known covert channels and participants will have the opportunity to examine the environmental, social, political, and security conditions that drive the creation of covert channels and will begin to examine ways in which the data loss can be mitigated.


Business Acumen for the Graduating Cybersecurity/InfoSec Student


Target Audience: Students
Workshop Organizer: Dr Jo Portillo (National Cybersecurity Student Association), Gustavo Hinojosa(University of Maryland University College and National Cybersecurity Student Association), Monique Jeffery (National Cybersecurity Student Association and University of Maryland Baltimore County), Vitaly Ford (Tennessee Tech and National Cybersecurity Student Association) and Jessa Gramenz (University of North Texas and National Cybersecurity Student Association).
Stipend/Incentive: None.
Time: 03/31 3:30 – 5:30 PM
Special Skills Required: None
Laptop Requirements: None

Do you have the right “ business acumen” to gain the advantage that you need to get ahead in your new organizational role? Join us as we explore the importance of Business Acumen as you move from your role as student to that of an Information Technology/ Cyber Security Professional. Let’s identify the ‘business skills’ that you need to get ahead in your first organizational role.

This session is designed to help students get a better understanding of business fundamentals, trends, economics and human behavior principles. Identify key concepts to improve your logic, reasoning, and analysis so that you are better equipped to address and solve organizational problems.


On Speaking Up: Workplace Communication 101


Target Audience: Anyone
Workshop Organizer: Elizabeth Weingarten, Laura Bate (New America Foundation), and Brooke Hunter (Open Tech Institute)
Stipend/Incentive: None
Time: 03/31 3:30 – 5:30 PM
Laptop Requirements: None

Drawing on the experience of one of America’s top think tanks, this workshop will focus on developing and practicing specific techniques that will help women in information security to advocate for themselves, their skills, and their contributions to the workplace. It will explore three specific scenarios that are often the greatest challenges to women entering– or moving up in– the workforce: job application and interviewing, salary negotiations, and public speaking. In both large- and small-group formats, participants will have an interactive opportunity to sharpen these skills through role-playing, brainstorming preparation techniques, and drafting and practicing language to make workplace challenges more comfortable


Building the Cybersecurity Workforce: Careers, Coaching, and Collaboration


Target Audience: Anyone
Workshop Organizer: Danielle Santos, Marian S. Merritt (NIST NICE)
Stipend/Incentive: None
Time: 03/31 3:30 – 5:30 PM
Laptop Requirements: None

As the demand for cybersecurity experts increases, the pressure is on to quickly fill open job with talent capable of meeting the need. This session will highlight efforts, tools, and resources that are helping to energize and promote a robust network and an ecosystem of cybersecurity education, training, and workforce development.


Cybersecurity Big Data and Analytics Sharing


Target Audience: Anyone
Workshop Organizer:Hsinchun Chen, University of Arizona; Resha Shenandoah, University of Arizona; Victor Benjamin, Arizona State University; Bhavani Thuraisingham, UT Dallas; Latifur Kahn, UT Dallas;
Stipend/Incentive: None
Time: 03/31 3:30 – 5:30 PM
Laptop Requirements: None

Cybersecurity has become a significant issue that presents new challenges to individuals, industry, and government. Despite its importance and the many novel advances in data-driven cybersecurity research, there as yet exists no platform to support sharing of the data, tools, and analytics needed for cybersecurity research. This workshop is being held to gain community input into the development of a platform to facilitate the sharing of critical cybersecurity-related data and tools for both research and education. The workshop agenda will include presentations by researchers at the cutting edge of cybersecurity R&D. In addition, audience participation, particularly from cybersecurity researchers, educators, and students, will be welcomed as input to the development of a new cybersecurity analytics platform.


Are Your Favorite Mobile Apps Leaking Your Personal Data?


Target Audience: Anyone
Workshop Organizer: Michele Guel (Cisco), Micaela Hoskins(Cisco) and Jay Koehler(Cisco)
Stipend/Incentive: None
Time: 04/01 2:30 – 4:30 PM
Laptop Requirements: Mobile phone, smart tablet or pc

This workshop will explore the world of data privacy and how many common and widely used mobile apps collect and retain personally identifiable information that is in no way needed for the application. Smartphones and tablets have become an integrated part of our lives. Many people even sleep with their phones and check text messages and social medial if they wake up during the night. There are thousands of applications available for download for the popular Android and IOS platforms. Often, end users fail to investigate and understand the sensitive data that is tracked, logged, stored and transmitted. All too often, end users choose the simple path of “click to accept” specific privacy policies rather than read through 4-10 pages of not so clear verbiage.
The workshop will be part lecture and part facilitated learning. Attendees will work in groups at tables (or individually) on the investigative topics that are listed in the PDF document that has been uploaded.


Beyond the Cyber Security Club


Target Audience: Students, Faculty
Workshop Organizer: Emily Wicki (New York University)
Stipend/Incentive: None
Time: 04/01 2:30 – 4:30 PM
Laptop Requirements: None

It seems like people often talk about how to start your own cyber security club.You’ve listened, you’ve implemented. You’ve got a flourishing organization that meets biweekly over pizza to discuss the latest security news and to play in CTFs. But now what? Learn how you can use local industry resources to evolve your organization from a modest club into a collaborative, fruitful research space. This workshop will teach you how to do everything from recruiting industry speakers to hosting hands-on workshops; both of which will put your club on the map and recruiters at your doorstep.


NSF CReST-Security Knitting Kit: Ready to Use Teaching Resources to Embed Security Topics into CS Courses


Target Audience: Faculty
Workshop Organizer: Sheikh Ghafoor and Konstantin Menako (Tennessee Tech University)
Stipend/Incentive: S150
Time: 04/01 2:30 – 4:30 PM
Laptop Requirements: Bring your own
Special Skills Required: Computer Science faculty in 4 year University

With support from NSF (Award# DUE-1140864, #1438861), we have developed a set of readily available resources (Security Knitting Kit, www.secknitkit.org), which offers a suite of instructional material for faculty to integrate security in CS courses such as operating systems, software engineering, computer network and database. This workshop will introduce CS faculty to the SecKnitKit resources that can be easily adaptable into any standard CS curriculum. The participants will receive access to all SecKnitKit materials (instructional and assessment) of interest and demonstrated use of the active learning exercises.

Women in Cybersecurity
© Copyright 2013 All Rights Reserved.

Site designed by Stephen Garrett
for Tennessee Tech University