Carnegie Mellon University Website Home Page
 

The ISO will be offering the following training sessions during the Fall semester of 2010!

Horizontal Rule

Tuesday, October 5, 2010

10:00 am - 11:30 am

UC, Wright

Security 101


Speaker:    Wiam Younes, Training and Awareness Coordinator

Abstract:

The end user is the last line of defense in protecting the portions of cyberspace with which they interact.  The Security 101 presentation responds to questions about the end-users role in cyber security; how to protect the data they handle as university employees, and how to secure computing resources and assets at work and home from cyber threats.


Audience:
Open to all University affiliates


Registration:
Required. Visit the Learning and Development Seminar Registration Site and choose CE 541.
or Email Wiam Younes at wyounes@andrew.cmu.edu

Top

Thursday, October 7, 2010

10:30 am - 12:00 pm

CyH 100

Identity Finder

Instructor:

   Wiam Younes; Training and Awareness Coordinator

Abstract:
Identity Theft is a rapidly mounting concern, which means that protecting your identity and the identity and privacy of others is vitally important. In this 90-minute class, you'll get hands-on instruction in how to use the Identity Finder software to find and secure information on your Windows-based computer that could make you, or other, vulnerable.  You will be surprised at how much personally identifiable information (PII) can be stored on your computer without your knowledge.

Audience:
Open to all University affiliates

Registration:
Required. Visit the Learning and Development Seminar Registration Site and choose CE 476.
or Email Wiam Younes at wyounes@andrew.cmu.edu

Top

Tuesday, October 12, 2010

10:00 - 11:30 am

UC, Dowd

Electronic stored information, preservation, and discovery strategies

Speakers:   

Daniel Munsch; Assistant General Councel

John Lerchey; ISO Incident Response Coordinator

This presentation is canceled due to low enrollment!

Abstract:
As recent law have placed new rules and regulations on institutions in the area of preserving and producing electronic stored information for legal cases, Carnegie Mellon is working to develop strategies and procedures so that we will be effective in compliance. 

This talk will discuss:

  • New rules of E-Discovery
  • Risks associated
  • Impact on the University
  • Challenges
  • OGC's and ISO's roles
  • Departmental/organizational impacts
  • Individual impacts

Time will be allocated to Q&A at the end of the presentation.

Audience:
Open to all university affiliates

Registration:
Required. Visit the Learning and Development Seminar Registration Site and choose CE 534.
or Email Wiam Younes at wyounes@andrew.cmu.edu

Top

Tuesday, October 19, 2010

02:30 pm - 04:00 pm

UC, Wright

Unhacking Windows Revisited: Infection, Detection, & Why You Should Reinstall

Speaker:    Theodore Pham, Information Security Engineer

Abstract:

The malware industry continues to focus on increasing profits.  The recent cyber attacks against Google and 30+ other US companies highlights the increasing use of sophisticated, stealthy malware for credential and data theft.  Organized crime groups are replacing "easy to clean" web pop-up adware and spambots with professionally written trojans bought on the black market and designed to quietly raid financial data from inside your web browser.  Industrial spies are employing custom tailored trojans to steal intellectual property without ever alerting your antivirus.  All delivered to victim machines via targeted emails, hijacked social networking accounts, hacked legitimate websites, and fake news sites.  Plus the trend du jour of malicious ads on major legitimate websites such as MSN.com, Live.com, Digg.com, and Oprah.com redirecting to web attack servers.

This talk will demonstrate popular infection methods and malware stealth techniques, describe host based detection tools, and discuss why you should reinstall instead of attempting cleanup. 

Audience:
Open to faculty and staff only

Refreshments:
Cookies and beverages will be served.

Registration:
Required. Visit the Learning and Development Seminar Registration Site and choose CE 535.
or Email Wiam Younes at wyounes@andrew.cmu.edu

Top

Wednesday

October 20, 2010

11:00 am - 12:00 pm

UC, Peter

Mobile Device Privacy

Speaker:    Norman Sadeh , Professor at the School of Computer Sciences

Abstract:

This presentation is designed to provide mobile device users with information on how to protect their privacy, and the university confidential information from compromise.



Audience:
Open to all University affiliates

Registration:
or Email Wiam Younes at wyounes@andrew.cmu.edu

Top

Thursday October 21, 2010

01:30 pm - 02:45 pm

UC, Dowd

Identity Theft


Speaker:    Wiam Younes, Training and Awareness Coordinator

Abstract:

Identity theft occurs when a criminal uses another person's personal information to assume that person's identity. The Identity Theft presentation will provide a detailed description of what personal information is and how criminals gain access to personal information.  The presentation will offer tips on how to protect yourself from Identity Theft at home and work, and will also outline the ISO process for responding to data breach incidents on campus.


Audience:
Open to all University affiliates

Registration:
Required. Visit the Learning and Development Seminar Registration Site and choose CE 540.
or Email Wiam Younes at wyounes@andrew.cmu.edu

Top

Monday, October 25, 2010

01:30 pm - 03:00 pm

UC, Connan

Cyberwar impact on the University End User

Speaker:    Tim Shimeall: Senior Member of the Technical Staff at Soft Engineering Institute (SEI)

Abstract:

Events in the last few years have shown that cyberwar has moved from a theoretical supposition to an active strategic option for a variety of nations and trans-national groups.  There are several ways in which end users, particularly at educational institutions, have been involved in cyberwar -- as victims, third parties, and proxies.  This talk discusses these roles, the effects on the end user, and the options available to university users to deal with those effects.  This talk ends with a brief discussion of possible future directions in cyberwar, and how these directions might affect university users.  

Audience:
Open to All university affiliates

Refreshments:
Cookies and beverages will be served.

Registration:
Required for staff. Visit the Learning and Development Seminar Registration Site and choose CE 620.
or Email Wiam Younes at wyounes@andrew.cmu.edu

Top

Tuesday- October 26, 2010

02:00 pm - 3:30 pm

UC, Dowd

Understanding Malware


Speaker:    Ted Pham; Information Security Engineer

Abstract:

Malware attacks continue to threaten organizations and users.  The organzied cyber criminlas driving the underground malware industry remain focused on increasing profits by tricking users into revealing their private credentials and data.  The nuisance, in your face web pop-up adware of years past has been replaced with professionally written stealth trojans and fake security software bought on the black market and designed to quietly raid financial data from inside your web browser or extort money directly by making your computer unusable.  All delivered to victim machines via targeted emails, hijacked social networking accounts, hacked leitimate web sites (e.g. MSN.com, Live.com, Digg.com, and Oprah.com) and fake news and search sites.

This talk will introduce you to:

  • A general understanding of malware
  • Popular infection methods and malware stealth techniques
  • The latest cyber scams and what becoming a victim can cost you and/or the university
  • Steps to protect yourself and the university from malware attacks


Audience:

Open to all university affiliates.

Registration:

Required: Visit the Learning and Development Seminar Registration Site and choose CE 619,
or Email Wiam Younes at wyounes@andrew.cmu.edu

Top