Title:Show Me What You Got – Advice for Landing a Job in Infosec
As the realm of information security has continued to grow, so has the demand for qualified people to work in the industry. This has also led to an increase in the number of applicants that are looking to get hired for these jobs, so it takes more effort than ever before to stick out from the crowd. I’ll be discussing some of the things that you can do to improve your odds of getting hired.
Mike Lisi is a Senior Consultant at HALOCK Security Labs and a co-founder of the hacker meetup group IthacaSec. He has also worked as a network administrator, a programmer/analyst, and a developer of offensive and defensive DoD technologies. Mike received a BS in Computer Science from SUNYIT (now SUNY Poly) as well as a handful of infosec certifications including the CEH, OSCP, and GWAPT. Mike is also the lead designer for the CNY Hackathon CTF.
Title:Workshop – Embedded Systems Hacking with the ESP32
Students will connect and provision the ESP32 with code to connect to securely the game service over wifi to receive the first half of the challenge key. They will then reprovision the ESP32 with a different operating platform and upload code to connect to a second game service over Bluetooth to receive the second half of the challenge flag.
Jennifer Allen is a cybersecurity professional with a focus on offensive security and ethical hacking, and 19 years in IT. She also volunteers for the DEFCON Darknet (dcdark.net), the DEFCON Biohacking Village (dcbhv.org), and community hacking and maker groups. She is certified GCIH, GPEN, GXPN, OSCP, and an Amateur Extra licensed ham operator.
Embedded systems have extensive applications in consumer, commercial, automotive, industrial and healthcare markets. Examples of embedded devices include TVs, household appliances, banking ATM machines, routers, POS (point of sale) terminals, automobiles and cell phones. Internally, many of these devices are much like a traditional personal computer, running static versions of Linux and Windows. Often times, these devices are connected to the Internet but have no way of patching against discovered vulnerabilities. This presentation will explore methods of accessing the underlying systems in these devices as well as demonstrate methods of discovering vulnerabilities.
Prof. Cook is the head of the Computer Network Tech program at Herkimer College. His research interests include embedded systems security, operating system and network security. He is a US Air Force veteran that has completed degrees in Data Processing, Programming and Systems as well as a BS and MS in Telecommunications from SUNY Poly. John’s career experience includes: government contracting at Rome Labs, and over 20 years as an independent IT consultant.
The emergence of main stream artificial intelligence has been a prediction of computer scientists for more than fifty years; yet, there are still no robots among us. After a half century of research and development, predictions by Ray Kurzweil of a break-through in less than two decades have refueled speculation. The renewed interest is aligned with ‘neuromorphinc computing,’ an approach inspired by biology. Reaching a break-through will involve much more than computer science alone can provide. It will rest on new foundations of nano technology, neuroscience, mathematics and behavioral sciences.
Michael Moore is a principle engineer and project manager at Harris Corporation in Rome NY. His career interests have focused on high performance computing, neuroscience, embedded systems, domain specific languages and distributed computing. Mr. Moore has published technical papers on the real-time emulation of a cortical visual track using CELL-B technology. He also published a book on real-time embedded software design, and has contributed to multiple defense system developments. Mr. Moore has a BS in Electrical Engineering from the University of Detroit, an MS in Electrical Engineering from the University of Dayton, and forty years of involvement with computer engineering. He has also served for the past 21 years as a School Board member at Oneida-Herkimer-Madison BOCES.
The data that we record daily about ourselves through our cell phones, credit card purchases, emails, social media postings, etc., helps us connect with each other and improve our quality of life. However, we are also enabling a set of societal harms that we have not yet begun to grapple with seriously. I will be discussing some of the problems of big data including insufficient anonymization and unfairness in automated decision making.
Jeanna Neefe Matthews is an associate professor of Computer Science at Clarkson University (Potsdam, New York). Her research interests include virtualization, cloud computing, computer security, computer networks and operating systems. At Clarkson, she leads several hands-on computing laboratories including the Clarkson Open Source Institute and Clarkson Internet Teaching Laboratory. Students in these labs and in her classes at Clarkson and Cornell have been winners in a number of prestigious computing contests including the 2001, 2002, and 2004 IBM Linux Challenge, the 2005 IBM North American Grid Scholar’s Challenge, the 2005 Unisys Tuxmaster competition, and the 2006 VMware Ultimate Virtual Appliance Challenge. She is currently a member of the Executive Committee of ACM as the Chair of the Special Interest Group Governing Board. She has written several popular books including Running Xen: A Hands-On Guide to the Art of Virtualization and Computer Networking: Internet Protocols in Action. Jeanna received her Ph.D. in Computer Science from the University of California at Berkeley in 1999, a B.S. in Mathematics and Computer Science from Ohio State University in 1994 and a B.A. in Spanish from the State University of New York at Potsdam in 2015.
The Spring 2016 CNY Hackathon talks will begin at 4:00PM on Friday April 22nd in the Frank E. Gannett Memorial Library concourse. We have four speakers lined up for this semester! Their talks abstracts and bios are listed below.