Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Raleigh ISSA September 8, 2016 Chapter Meeting
Tell a Friend About This EventTell a Friend
 

The September chapter meeting will be held on the SECOND Thursday, September 8TH, instead of the first Thursday

9/8/2016
When: September 8
5:15PM
Where: RTP Headquarters/Conference Center
12 Davis Drive
Research Triangle Park, North Carolina  27709
United States
Contact: Raleigh ISSA voting board


Online registration is closed.
« Go to Upcoming Event List  

Raleigh ISSA THURSDAY SEPTEMBER 8, 2016 Chapter Meeting

Meeting Sponsor -Infoblox

  

AGENDA

5:15 – 6:00pm Career Services (Conference Room 1)

5:15 – 6:00pm CISSP Study Group (Conference Room 2)

5:15 – 6:00pm Back-to-Basics (Main Room) - Dr. Chris Hazard

6:00 – 6:30pm Moe's/ Drink / Socializing (Lobby)

6:30 – 7:00pm Vendor Presentation (Main Room) –Infoblox - Panel Discussion

7:00 – 7:15pm Board Updates (Main Room)

7:15 – 8:15pm Main Presentation (Main Room)  - Dr. Erol Oza - “Device Fingerprinting: Threats and Opportunities”

  

 

5:15 Back to Basics

Title: "Game Theory for Security Professionals"

Abstract:
What is game theory and how does it relate to information security?  Join Dr. Chris Hazard, as he gives a crash course on game theory with respect to information security, giving the audience an intuition for incentives and strategy.  He will discuss topics such as Nash equilibrium, evolutionary stable strategies, and Stackelberg games, and how they relate to many aspects of security, including the economics of attacks, adoption of security standards, and practices of software and network heterogeneity.

Speaker: Dr. Chris Hazard


Dr. Chris Hazard

CEO Hazardous Software

Bio:

Dr. Christopher Hazard is the CEO and founder of Hazardous Software where he designed and created the Resequence Engine, which is widely considered to be a disruptive technology for strategy-level serious gaming.  He holds a PhD in computer science from North Carolina State University in artificial intelligence, specifically on the science and mathematics of building, measuring, and exploiting trust and reputation systems.  Dr. Hazard has consulted for many organizations on serious games, been a software architect of CDMA infrastructure at Motorola, and worked on robot coordination and supply chain management at Kiva Systems (now Amazon Robotics) and North Carolina State University.  He has lead serious gaming projects related to cyber security, logistics, economics, and psychology, and is a certified hypnotist.  Dr. Hazard is also known for his 2011 game Achron, which won GameSpot's Best Original Game Mechanic award, and for his research on game design, AI, and human-computer interaction, for which he has given keynote speeches at major conferences and been featured in mainstream media.


 

7:15 State Of The Art(SOTA) -   Main Presentation

Title:  “Device Fingerprinting: Threats and Opportunities”

Speaker:  Dr. Erol Oza

Bio

Dr. Erol Ozan is an associate professor at the Department of Technology Systems at East Carolina University (Greenville, North Carolina). He received his Ph.D. in Engineering Management from Old Dominion University (Virginia), his MS in Physics from the University of Istanbul (Turkey), and his BS in electrical and electronics engineering from Middle East Technical University (Turkey). Dr.Ozan has worked in a number of academic projects supported by NASA, the National Science Foundation, the Department of Defense, and the Department of Transportation of North Carolina. DrOzan’s teaching and research interests include economics of information technology, web application development, and the information technology risk management.


Abstract

Web based device fingerprinting is the process of gathering data from client computers for the purpose of identification and tracking of individual client machines without requiring the use of cookies. This presentation reviews the device fingerprinting techniques and their applications in creating more secure authentication methods for web sites. The malicious use of the technology and privacy issues are also addressed. Future trends and new approaches are discussed.

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

12/6/2016 » 12/7/2016
Threat Intelligence Summit 2016

12/8/2016
December 2016 CISO Mentoring Webinar Series

12/9/2016
Financial SIG Quarterly Webinar

12/10/2016
SecureMiami

12/12/2016
Women in Security SIG Monthly Webinar




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information