The State of Cyber Security

July 29, 2015 by · Comments Off on The State of Cyber Security
Filed under: Computer, Events, Security 

On Wednesday, 14 October 2015, Don Thomas will discuss “The State of Cyber Security”.

Abstract

Smart capabilities enter every facet of our lives. From the internet we can control our environment remotely as well as perform activities that no longer require our physical presence. Anything that can be converted in digital form can be transported through the cyber network across the globe. But data has value and is the target of piracy or malicious destructions.

Cyber security today is a global affair. Attacks can come from anywhere in the world. Anyone or system connected to the internet can become a target of cyber-attacks. Cybercrime is getting organized and weaponized, creating hubs of services that novices or non-technical minds can use to participate in the DarkNet, but could not handle the technical dimension.

Strengthening the security and resilience of cyberspace has become an urgent priority for Governments, global corporations and individuals to protect their privacy, intellectual property and identity. The risk of a wide-scale malevolent attack is high. Protecting systems and networks from unwanted cyber intrusions, denial of service attacks and intellectual property theft is particularly difficult. Don Thomas will go over the current state of cyber security, go over some recent high profile crimes and will highlight some of the strategies recommended to fend waves of future attacks.

About the Speaker

Don Thomas is a Principle Computer and Network Security Architect. He has designed, developed and networked IT systems to protect corporations from cyber fraud for more than 18 years. Mr. Thomas has focused on comprehensive architectures to mitigate the current threats and evolve network topologies cost effectively to defend companies from future risks. Don Thomas worked for Bank of America as the Chief DMZ Architect protecting over $250MM in assets globally and responsible for the architecture, governance and roadmaps for the DMZ, global mobility and remote access solutions. Prior to Bank of America, Mr. Thomas worked for prominent corporations, Munger Tolles & Olson, LLP, JP Morgan Chase, Washington Mutual, EarthLink, Nortel, Disney Worldwide Services, IBM, and Lockheed CADAM among others. Don Thomas has a BS in Electrical Engineering from the California State University Northridge. Mr. Thomas is a Certified Information Systems Security Professional (CISSP), a Certified Information Systems Auditor (CISA) and a Certified Global Information Assurance Incident Handler (GIAC/GCIH). Don Thomas is, involved in several technical societies that advance technology, IEEE Computer Society, Information Systems Security Association (ISSA), Open Web Application Security Project (OWASP), Cloud Security Alliance (CSA) and more.

Meeting Info

Meetings are free and open to the public.

Please register at the link below:
https://meetings.vtools.ieee.org/m/35416

Pizza and networking:  6:30 PM
Presentation, Q&A:  7:00 PM

Location:
Swenson Center, Room 101
California Lutheran University
141 Faculty Street
Thousand Oaks, CA  91360

Parking:    Free parking is available in the G1 visitor lot at the corner of Olsen Road and Mountclef Boulevard.  Alternatively, CLU Public Safety has provided us with parking passes for on street parking.  Do not park in the faculty/staff lots, and do not park in areas marked “Homeowner Parking Only”.

Additional maps:  http://computer.ieee-bv.org/meetings/

DOC to PDF    Send article as PDF   

High School Robotics Teams from Ventura County

April 15, 2015 by · Comments Off on High School Robotics Teams from Ventura County
Filed under: Computer, Events, Robotics 

On Wednesday, 22 April 2014, high school students from Ventura County teams will demonstrate the robots they entered in the Los Angeles Regional FIRST Robotics Competition.

Abstract
FIRST is the largest national robotics competitions of its kind at the high school level.  Students have only six weeks to design, build, program, and test a robot to perform against a field of competitors.  The game, the rules and the robot specifications are different every year.  This year, the game was Recycle Rush.  Recycle Rush is a recycling-themed game played by two alliances of three robots each. During the 2.5 minute match, robots score points by stacking totes on scoring platforms, capping those stacks with recycling containers, and properly disposing of pool noodles, representing litter.

In this competition, students get to:

  • Work alongside mentors who volunteer their time and talents to guide each team.
  • Build and compete with a robot of their own design.
  • Learn and use sophisticated software and hardware.
  • Compete and cooperate in alliances and tournaments.
  • Earn a chance to compete in the world championship.
  • Qualify for over $20 million in college scholarships.

We will hear a short introduction in the lecture hall, followed (weather permitting) by an extended demonstration and Q&A outside.  This is an excellent opportunity to get kids interested in science and engineering.

Meeting Info
Meetings are free and open to the public.
Please register at the link below:
https://meetings.vtools.ieee.org/m/34306

Pizza and networking:  6:30 PM
Presentation, Q&A:  7:00 PM

Location:
California Lutheran University
Ahmanson Science Center, Room 100
Thousand Oaks, CA  91360

Parking:  Do not park in the faculty/staff lots.  Free parking is available in the G1 visitor lot at the corner of Olsen Road and Mountclef Boulevard.  Alternatively, CLU Public Safety has provided us with parking passes for on street parking.

Additional maps:  http://computer.ieee-bv.org/meetings/

HTML to PDF    Send article as PDF   

Tools of the Professional Security Researcher and Methods to Bypass Password Authentication Protected by Active Directory

February 10, 2015 by · Comments Off on Tools of the Professional Security Researcher and Methods to Bypass Password Authentication Protected by Active Directory
Filed under: Computer, Events, Security 

On Wednesday, 11 March 2015, Russ Swift, Manager of information Security at a Financial Services SaaS company, will be presenting on Tools of the Professional Security Researcher and Methods to Bypass Password Authentication Protected by Active Directory.

Abstract

This presentation will go over the evolution of obtaining password hashes and will cover the specialized tools and methods of dumping Active Directory password hashes from a domain controller. It will also cover advanced methods of direct disk access to copy and manipulate system files.  The presentation will provide a historical overview of old attack methods, details around the latest methods and ideas for detecting these type of compromises and intrusions.

About the Speaker

Russ Swift is a security professional with over ten years of experience providing security engineering, penetration testing and consulting services to Fortune 100 companies within entertainment and finance industries. Russ has developed information security courseware for penetration testing for training companies and he is also a SANS curriculum advisor and researcher.  Russ’ expertise is in Microsoft Active Directory, wireless, antivirus evasion and penetration testing.

Meeting Info

Meetings are free and open to the public.

Please RSVP at the link below:
https://meetings.vtools.ieee.org/m/33063

Pizza and networking:  6:30 PM
Presentation, Q&A:  7:00 PM

Location:
Richter Auditorium, Ahmanson Science Center
California Lutheran University
Thousand Oaks, CA  91360

Parking:  Do not park in the faculty/staff lots.  Free parking is available in the visitor lot at the corner of Olsen Road and Mountclef Boulevard.  Alternatively, CLU Public Safety has provided us with parking passes for on street parking.

Additional maps:  http://www.ieee-bv-cs.org/meetings/

PDF Creator    Send article as PDF   

Visual Search using Vector Quantization

December 30, 2014 by · Comments Off on Visual Search using Vector Quantization
Filed under: Computer, Events, Image Processing 

On Wednesday, 14 January 2015, Ole Eichhorn will discuss Visual Search using Vector Quantization.

Abstract

The techniques of vector quantization have long been used for data compression, but they can also be used as an innovative way to accomplish pattern recognition. When a dataset is “kernelized” it is transformed into a smaller denser space that enables fast lossy searching. This can be particularly useful as a way to implement image matching for visual search. This talk will describe various ways of “kernelizing” images and methods for storing and retrieving the resulting vectors. It will also describe a visual search engine implementation based on these methods, and touch on related techniques including kernel synonymization and iterative turning. And yes, there will be a demo.

About the Speaker

Ole Eichhorn has more than 25 years of experience as an entrepreneur, software engineer, architect, and manager.  In 2013 he founded eyesFinder, a company developing leading-edge Visual Search solutions.  In 2011 he co-founded DoubleBeam, which develops mobile payments solutions.  Ole was the founding CTO of Aperio in 2001, the leader in digital pathology solutions, and actively participated in developing applications of this technology for patient care.  Previous to that Ole served as SVP/Engineering at PayPal, GM of Online Billpay at Intuit, VP/Engineering for Digital Insight, and Director of Technology for XP Systems.

Meeting Info

Meetings are free and open to the public.

Pizza and networking:  6:30 PM
Presentation, Q&A:  7:00 PM

Location:
Richter Auditorium, Ahmanson Science Center
California Lutheran University
Thousand Oaks, CA  91360

Parking:  Do not park in the faculty/staff lots.  Free parking is available in the visitor lot at the corner of Olsen Road and Mountclef Boulevard.  Alternatively, CLU Public Safety has provided us with parking passes for on street parking.

Additional maps:  http://www.ieee-bv-cs.org/meetings/

ODT to PDF    Send article as PDF   

Threat Modeling Potentially Vulnerable Devices

October 15, 2014 by · Comments Off on Threat Modeling Potentially Vulnerable Devices
Filed under: Computer, Events, Security 

On Wednesday,12 November 2014, Brian Knopf will discuss
Threat Modeling My Wife: How a security researcher deals with potentially vulnerable devices that provide high quality of life improvements.

Abstract

This talk discusses what I went through when my wife needed to have a pain management device implanted in her back to make her mobile again. From building a threat model to weighing the benefits versus the potential risk and how I overcame security paranoia to better her life. I will talk about the differences between these devices and other devices that have known wireless exploits. While cameras and other IoT devices can be compromised, there is not the same safety concern as when a device is necessary to provide quality of life. Unlike an insulin pump, there is no manual alternative available to make those with chronic pain mobile again.

About the Speaker

20 years of experience in IT, development, QA/QE, and security. Brian has built and managed QA, automation, security, and development teams for companies including Rapid7, MySpace, Youbet.com, eUniverse, and VeriTest. Currently the Director of Application Security at Belkin International responsible for SDL, PSIRT, security research, and pen testing of Belkin and Linksys Networking, WeMo (home automation), and SMB products. This includes security of hardware, firmware, mobile applications, and cloud environments. Prior to Belkin, Brian spent 3 years building Nexpose, the leading Vulnerability Management product at Rapid7.

Meeting Info

Meetings are free and open to the public.

Pizza and networking:  6:30 PM
Presentation, Q&A:  7:00 PM

Location:
Richter Auditorium, Ahmanson Science Center
California Lutheran University
Thousand Oaks, CA  91360

Parking:  Do not park in the faculty/staff lots.  Free parking is available in the visitor lot at the corner of Olsen Road and Mountclef Boulevard.  Alternatively, CLU Public Safety has provided us with parking passes for on street parking.

Additional maps:  http://www.ieee-bv-cs.org/meetings/

Create PDF    Send article as PDF   

Next Page »