Cybersecurity Conference (2013)
Thursday, Sept. 19, 2013
NYIT Auditorium on Broadway
1871 Broadway at 61st Street
New York City
Presented by NYIT's School of Engineering and Computing Sciences, cyber security experts discussed topics such as protecting individuals and organizations against cyber-attacks, mobile device security, biometrics and big data analytics as cyber defense tools, and cyber education.
Speakers & Poster Presentations
Students
- Willie Tsang (NYIT undergraduate, REU 2013 fellow): "Collective Model of Future Smartphone Botnets"
- Nicole Gutierrez, James Hanvey, and Carmine Belmonte (NYIT undergraduates, REU 2013 fellows): "Indoor Localization"
- Nnanna Okorie (NYIT graduate student): "Power Analysis of Secure Multi-party Protocols on Android Smartphones"
- Sathya Govindarajan (NYIT graduate student): "Secure Privacy-preserving Protocols for Outsourcing Continuous Authentication of Smartphone Users with Touch Data"
Faculty
- Ziqian (Cecilia) Dong, Ph.D. (NYIT): "IP Geolocation as a Forensics Tool"
- Alberto Compagno, Mauro Conti (University of Padua), Paolo Gasti (NYIT), Gene Tsudik (University of California Irvine): "NDN Interest Flooding Attacks and Countermeasures!"
- Wei Ding (NYIT), Kevin Prewitt (Carnegie Mellon University): "Multimodal Implicit Authentication of Mobile Phones Using Sonic Distance Measurements"
- Kiran S. Balagani (NYIT), Vir V. Phoha (Louisiana Tech University), Andrew Rosenberg (Queens College, CUNY): "A New Cognition-Centric Paradigm for Continuous User Authentication"
Learn more about all of our Speakers and Presenters
Media Coverage
Follow the conversation on Twitter at #nyitcyber.
Agenda
NYIT 4TH CYBERSECURITY CONFERENCE |
|
8:15 a.m. |
Breakfast and Registration |
9 a.m. |
Welcome
|
9:05 a.m. |
Opening Remarks
|
9:15 a.m. |
Remarks
|
9:20 a.m. |
"Achieving Confidence in Cyberspace in an Ever-Changing Ecosystem"
|
10:05 a.m. |
"Cyber Security Education for the Next Generation—Emerging Best Practices"
|
10:30 a.m. |
"Current Cyber Security Issues"
|
10:40 a.m. |
Faculty Poster Pitches |
10:50 a.m. |
Networking Break and Poster Session |
11:05 a.m. |
"Cyber Security and Health Care: Better Health Through Trusted Relationships"
|
11:30 a.m. |
"Is Everything We Learned About Security Wrong?"
|
11:55 a.m. |
"How is it Done: The Protection of Individuals, Organizations, and Infrastructure Against Cyber Attacks"
|
12:20 p.m. |
Lunch |
1:30 p.m. |
Afternoon Welcome
|
1:35 p.m. |
Afternoon Keynote Address "Bug Parades, Zombies, and the BSIMM: A Decade of Software"
|
2:20 p.m. |
"Combatting 21st-Century Pirates & Swashbucklers: National Science Foundation Secure & Trustworthy Cyberspace"
|
2:45 p.m. |
Panel Discussion: Biometrics and Big Data Analytics as Cyber Defense Tools Moderator:
Panel members include:
|
3:45 p.m. |
Networking Break and Poster Session |
4 p.m. |
Academic/Cyber Education Session
|
5:15 p.m. |
Cyber Career Panel Moderator:
Panel members will include:
|
6 – 6:30 p.m. |
Parents and Students Reception |