Download the FULL schedule HERE.


FRIDAY, APRIL 11th , 2014

1:30 - 5:00 pm.

Registration:

Registration will open at 1:30 PM

Refreshments

Refreshments will be served from 2:30 PM

2:00 - 4:30 pm.

Security Competition Student Workshop: Jason Pittman, Capitol College

Secure Coding Faculty Workshop: Elizabeth Hawthorne, Union Collge and Blair Taylor, Towson University

4:30 - 5:30 pm

Student Poster Session

Resume Clinic: Don Foster, TTU

5:30 - 6:45 pm

Dinner

Welcome Remarks: Dr. Joseph Rencis, Dean, College of Engineering, Tennessee Tech University

Opening Remarks: Dr. Ernest McDuffie, Lead for National Initiative for Cybersecurity Education (NICE), National Institute of Standards and Technology

Keynote

Dr. Deborah Frincke, Commadant National Cryptologic School/Training Director NSA:

Follow Your Heart While Using Your Head: The talk will build on the speaker’s personal journey, through university educator, startup company, chief scientist at a national laboratory, and now senior executive leadership at the National Security Agency. The speaker will emphasize “ah ha!” moments and turning points along the way.

7:00 - 7:45 pm

Session I with Distinguished Speakers

Track A: Research

Dr. Jaeyeon Jung, CRA Distinguished Speaker, Microsoft Research

Consumer privacy protection on mobile devices: The talk will discuss limitations of the current mobile ecosystem that permitted “unexpected use” of privacy-sensitive information, including ineffective permission request dialogs, lack of data flow feedback to users, and little technical support to app developers for “privacy debugging”. Will present speaker’s past and current research projects to address some of these issues.

Track B: Education

Dr. Diana L. Burley, CRA Distinguished Speaker, George Washington University

Disrupt!: The complex cybersecurity environment requires actions and voices that disrupt accepted thought patterns and challenge the status quo. This talk will share how speaker discovered the value of disruptive ideas for addressing the nation’s cybersecurity challenges, and will encourage you to think about how you can frame your education and experience in this same way.

Track C: Industry

Lisa Foreman, Women’s Society of Cyberjutsu

Cyberjutsu: The Art of Cyber: Founder & CEO of the Women’ Society Cyberjutsu, shares her journey into the cyber profession. The talk will discuss why there has never been a better time to be a cyber professional and how women can provide new insight and capabilities to this challenging and rewarding career. Speaker will illustrate how we possess the innate ability to lead teams and provide solutions to complex challenges.

7:45 - 8:30 pm

Session II: Technical Presentations

Track A: Research

Emily Shen, MIT Lincoln Lab

Efficient, Privacy-Preserving Data Sharing: Modern cryptography provides several different types of tools that offer the promise of searching on encrypted data. This talk will illustrate the crypotographic advances that make these technologies possible. Additionally, the rigorous software engineering and formal techniques employed by MIT Lincoln Laboratory to test that the researchers’ software met all of the security, functionality, and performance requirements will be described.

Track B: Education

Diane Murphy and Michelle Liu, Marymount University

Redefining Cybersecurity Competitions to Increase Female Participation: One of the first exposures to cybersecurity for young people is often the cybersecurity competition, offered at the high school and college levels. Most of these competitions have a decidedly “male” focus, based on military principles, emphasizing success as being successful “attacks” to a system. As a result, very few females are attracted to these events and only a few participate. How can that be changed? This work, sponsored by the National Science Foundation (NSF) under award number 1318799, will describe some of our research on cybersecurity competitions, particularly female participation, on our experience with facilitating student involvement in developing the competition platform, and our approach to attracting female high school students to the summer institute.

Track C: Industry

Robin Williams, Chief, National Cybersecurity Education & Awareness Branch, Department of Homeland Security

Women in Cybersecurity: Opportunity is Knocking: This presentation focuses on national effort to raise the bar of cybersecurity skills across the nation, and how women are key to the success of our nation’s efforts to protect our economic and national security.

8:30 - 9:15 pm

Session III: Panel Session

Track A: Education

(Moderator) Lisa Duge: Johns Hopkins University (Panelists) Diana Burley: George Washington University, Ronda Henning: Harris Corporation/Florida Institute of Technology, Jaeyeon Jung: Microsoft Research, Susanne Wetzel: Stevens Institute of Technology

Graduate School Panel: A graduate school panel would be a great way for undergraduate students or professionals seeking another degree to learn about educational opportunities. The panel members could consist of: graduate students, professors, and current professionals who attended grad school. Topics to discuss include scholarships (SFS and others), degree choices (computer science, information security, policy), benefits, and finding the right program.

Track B: Research

(Moderator) Sharon Burlingame: Pellissippi State Community College (Panelists) Valerie Barr: National Science Foundation, Terry Benzel: University of Southern California, David Dampier: Mississippi State University, Li Yang: University of Tennessee at Chattanooga

Obtaining Funding for Cyber Security Initiatives:Panelists who have written successful grants will share their insights, success stories, challenges, opportunities, and strategies for obtaining funding and maintaining successful programs.

Track C: Industry

(Moderator) Dawn Beyer: Lockheed Martin (Panelists) Linda Ciulla: RSA, Eleni Gessiou: Facebook, Kelley Misata: TOR Project, Perri Nejib: Lockheed Martin

How Did I Get Here: My Struggles and Triumphs: Technical women across cybersecurity industry will share experiences and thoughts on the industry world of cyber security, how they got there, challenges and overcoming of challenges, and the opportunities the area presents. Goal is to foster interest in cyber security as a career in industry and provide guidance on how to pursue.

9:15 - 9:45 pm

Session IV: BoFs (Birds of a Feather Sessions)

Track A: Research

Rose Shumba: UMUC, Rebecca Bace: University of South Alabama, Corrinne Sande: Whatcom Community College, Carol Taylor: Eastern Washington University

Is Cybersecurity different from Computer Science with regard to Recruiting and Retaining Women and Minorities in the field?: This BoF session will discuss whether Cybersecurity is indeed substantially different from Computer Science (CS) with regard to recruiting and retaining women and minorities in the field. This work is a continuation of the ITiCSE 2013 Working Group (WG) on Cybersecurity, Women and Minorities.

Track B: Education

Barbara Hewitt, Texas A&M University

Enhancing Classroom Learning About Security with other Opportunities: This discussion will stem around the mechanisms that instructors can use to enhance the delivery of security content including meetings such as local ISSA meetings, webinars, conferences, YouTube Videos, hands-on workshops, internships, class field trips, speakers, competitions, and online course delivery.

Track C: Industry

Caroline Dennis, Career Catalyst

Information Security Career Trends: What’s Hot and Where do You Fit?: This discussion will kick off with a broad overview of the current and emerging job outlook of infosec professionals. Discussion will include kind of job environments exist for different career paths in infosec and how can women find their place in it. This discussion will be aimed at helping to bring the various career choices into better focus.

9:45 - 10:45 pm

Refreshment

Social/Networking/Ice-breaker Activity

Fun and Fondue: Susan Kevra and The Cantrells

 

SATURDAY , APRIL 12th, 2014

8:15 - 9:45 am.

Breakfast

Opening Remarks: Valerie Barr, Program Director, NSF

Keynote: Michele Cantley, Senior Vice President and Chief Information Security Officer, Regions Financial

How to Establish a Career in Cybersecurity and the Track to Becoming a CISO The talk will address the do’s and don’ts with regard to degrees, certifications and experience. The speaker will also provide helpful advice on the skills needed by a CISO and her personal experiences with the paths various CISO’s (including herself) have followed to get the job. Lastly, she will address the all important topic of networking.

9:45 - 10:45 am.

Session V: 5 Minute Lightning Talks

Kieu Lam, Facebook

2fac authentication + your organization: Will present how Facebook implemented 2fac authentication using the latest technologies with the least amount of friction. Security can be simple and sexy.

Dawn Carroll, Cigital

Networking for the Introverted: Will focus on ways to get out of introvert shell and push oneself into unfamiliar waters to achieve success.

Melaina Myers and Vitaly Ford, Tennessee Tech University

CyberEagles: A cybersecurity club for students: Will present the benefits and mechansims of inititaing and sustaining a cybersecurity club for students. TTU CyberEagles club will share their story.

Susanne Wetzel, Stevens Institute of Technology

Pathways in Cybersecurity between 2-Year and 4-Year Institutions: Will present the pilot study between Union County College and Stevens Institute of Technology to explore options for a pathway between 2-year and 4-year institutions. We will discuss opportunities, challenges, and lessons learned to date.

Dawn Isabel, Hewlett-Packard

Data, Unprotected: How mobile applications betrayed my trust: Will present the results of analyzing personal smartphone for evidence of sensitive data disclosure, and summarize best practices for protecting your data – even when your apps don’t.

Dale Rowe, Brigham Young University

Continuing Education: Will present continuing education opportunities for women focusing on Graduate studies and Certifications. Based on experiences within IT program.

Suzanne Mello-Stark, University of Rhode Island

Digital Forensics and Cyber Security: Will present Digital Forensics and Cyber Security Programs overview, differences, opportunities and example in University of Rhode Island.

Jeremy Epstein, Applied Computer Security Associates

Scholarships for Women Studying Information Security (SWSIS): SWSIS offers various scholarships for women studying any aspect of information security at an undergraduate or masters’ level. Will describe the history and future of the program, and describe the requirements and deadlines for application.

10:45 - 11:00 am

Picture Session

11:00 – 11:15 am

Refreshment Break

11:15 - 12:00 pm

Session VI with Distinguished Speakers

Track A: Research

Dr. Jeanna N. Mathews, ACM Distinguished Speaker, Clarkson University

Strategies for Research in Computer Security: The talk will discuss strategies for finding important and inspiring cybersecurity problems that you are able and ready to solve. We will look at concrete examples of using readily available systems and data to study attackers and their methods. We will then discuss how to take the insight you gain and turn it into high quality publications.

Track B: Education

Dr. Cynthia Irvine, Naval Postgraduate School

Through the tangle of cyber education: Is learning cyber security a sentence to life in the cyber dungeon as a boring drone? No! This talk will explore the context of cyber studies and how various paths in the classroom can lead to fulfilling careers.

Track C: Industry

Merisa Viveros, Vice President, Cyber Security Innovation initiative, IBM Corporation

Leading a Security Team: Challenges and Rewards: This presentation describes the challenges that security leaders must face in an environment of increasing threats. Deriving from experiences in the field, it recommends best practices for addressing and solving these challenges, by leveraging people, processes and technology. It also highlights the increasingly important and technically rewarding role played by skilled security professionals.

12:00 - 12:45 pm

Session VII: Technical Presentations

Track A: Research

Limin Jia, Carnegie Mellon University

Formal Models and Verification of Software Systems: Formal verification of system properties is crucial to the security of software systems. Combining the design, implementation, and verification of software systems can produce high-assurance systems. This talk will present two research projects where the modeling and verification play a central role in ensuring the security of the software systems.

Track B: Education

Dianne Fodell, IBM and Scott Buck, Intel Industry Resources for Universities for Supporting Cyber Security

Education: This presentation demonstrates how industry, particularly IBM and Intel can assist university faculty in developing and delivering excellent security education to university students around the world.

Track C: Industry

Lora Mcintosh, Regions

Application Security: (White Hat) Hacking for a Living: Popular culture would have us believe that the only hackers are anti-social males who spend every day in a basement trying to steal your credit cards, money and identity. On the contrary, a number of skilled hackers are behind the scenes at companies worldwide. These individuals work to exploit applications and push for remediation so that malicious hackers cannot exploit them. This talk will explore web application security in the corporate world and the major application flaw types as well as the knowledge, skills, and tools to it takes to be a professional white hat hacker.

1:00 - 2:30 pm

Lunch

NCWIT TN Aspiration Awards: Ruthe Farmer, Director of Strategic Initiatives, National Center for Women & IT (NCWIT) and Martha Kosa,TTU

WiCyS Poster Awards

Closing Remarks: Becky Bace, Chief Strategist for the Center for Forensics, Information Technology and Security (CFITS), University of South Alabama

2:30 - 4:30 pm

Career Fair

Graduate School Fair

Discovering CyberSecurity Student Workshop: Tom Pigg and Lisa Matlock, JSCC

Facilitating Active Learning in Security Faculty Workshop: Ambareen Siraj, TTU