2013 Partnerships

HONORARY CONFERENCE CHAIRS

  • Rev. Joseph M. McShane, S.J.
    President, Fordham University, New York, NY USA
  • Robert S. Mueller, III
    Director, Federal Bureau of Investigation, Washington, DC USA

CONFERENCE CHAIRS

  • George Venizelos
    Assistant Director in Charge, Federal Bureau of Investigation, New York, NY USA
  • Stephen Freedman, Ph.D.
    University Provost, Fordham University, New York, NY USA

ADVISORY COMMITTEE CHAIRS

  • Austin P. Berglas
    Acting Assistant Special Agent in Charge, Federal Bureau of Investigation, New York, NY USA
  • Edward M. Stroz
    Co-President, Stroz Friedberg LLC, New York, NY USA

ADVISORY COMMITTEE

  • Rich Baich
    EVP/Chief Information Security Officer, Wells Fargo & Company, San Francisco, CA USA
  • Thomas G.A. Brown
    Deputy Chief for Cyber, United States Attorney's Office, Southern District of New York, United States Department of Justice, NY USA
  • Joseph M. Demarest Jr.
    Assistant Director, Cyber Division, Federal Bureau of Investigation, Washington, DC USA
  • Mary E. Galligan
    Former Special Agent in Charge, Special Operations, Cyber Division, Federal Bureau of Investigation, New York, NY
  • Amy S. Hess
    Assistant Director, Federal Bureau of Investigation, Washington, DC USA
  • Gerald D. Hill III, D.Sc.
    Senior Principal, The MITRE Corporation, McLean, VA USA
  • Roderick J. Holland
    Chief Architect, Multimedia & Collaboration Information Technology Center, The MITRE Corporation, Bedford, MA USA
  • Robert E. Joyce
    Deputy Director, Information Assurance Directorate, National Security Agency, Fort Meade, MD USA
  • Ruby B. Lee, Ph.D.
    Forrest G. Hamrick Professor of Electrical Engineering and Computer Science, Princeton University, Princeton, NJ USA
  • Simon Y. Liu, Ph.D.
    Director, National Agricultural Library, United States Department of Agriculture, Washington, DC USA
  • Bruce M. Maggs, Ph.D.
    Professor of Computer Science, Duke University, Vice President for Research Akamai Technologies, Boston, MA USA
  • Maj. Gen. Gary O'Shaughnessy (USAF, Ret.)
    Vice President, Oracle National Security Group, Washington, DC USA
  • Charles C. Palmer, Ph.D.
    Chief Technology Officer, Security and Privacy, IBM Research, Hawthorne, NY USA
  • Marek Rusinkiewicz, Ph.D.
    Vice President and General Manager Applied Research Laboratories, Telcordia Technologies, Piscataway, NJ USA
  • John Pignataro
    Director, Security Incident Response Team (SIRT), Citigroup, New York, NY USA
  • Marek Rusinkiewicz, Ph.D.
    Florida International University, Miami, FL USA
  • K. Beharry Singh
    President & Chief Executive Officer, Cenosystems Inc., New York, NY USA
  • George O. Strawn, Ph.D.
    Director, National Coordination Office, NITRD Program, Washington, DC USA
  • Akio Sugeno
    Vice President, Internet Engineer and Operations, Telehouse America, New York, NY USA

PROGRAM COMMITTEE

  • Austin P. Berglas
    Assistant Special Agent in Charge, Special Operations/Cyber Division, Federal Bureau of Investigation, New York, NY USA
  • D. Frank Hsu, Ph.D.
    Clavius Distinguished Professor of Science, Fordham University, New York, NY USA
  • Dorothy A. Marinucci
    Office of the President, Fordham University, New York, NY USA
  • David Sebastiani
    Supervisory Special Agent, Cyber Branch, Federal Bureau of Investigation, New York, NY USA

ORGANIZING COMMITTEE

  • Jedd Applebaum
    Office of Facilities Operations, Fordham University, New York, NY USA
  • Jenifer Campbell
    Director, Residential Life, Fordham University, New York, NY USA
  • Ann Delaney Chillemi
    Office of the Vice President for Lincoln Center, Fordham University, New York, NY USA
  • Annette Collazo-Comito
    Sodexo Corporation, Fordham University, New York, NY USA
  • Marc Canton
    Intercampus Transportation, Fordham University, New York, NY USA
  • John Carroll
    Office of Security and Campus Safety, Fordham University, New York, NY USA
  • Charles Copeland
    Sodexo Corporation, Fordham University, New York, NY USA
  • Kieran Croke
    Office of Security and Campus Safety, Fordham University, New York, NY USA
  • Linda Farrugia
    Office of the President, Fordham University, New York, NY USA
  • Rebecca Gruia
    School of Law, Fordham University, New York, NY USA
  • Bob Howe
    Office of Marketing and Communications, Fordham University, New York, NY USA
  • Kevin J. Kelly
    Department of Computer and Information Science, Fordham University, New York, NY USA
  • Dennis Kempf
    Special Agent, Cyber Branch, Federal Bureau of Investigation, New York, NY USA
  • James Kempster
    Office of Marketing and Communications, Fordham University, New York, NY USA
  • Vincent Kocovic
    Office of Facilities Operations, Fordham University, New York, NY USA
  • Joseph Lawlor
    Special Agent, Cyber Branch, Federal Bureau of Investigation, New York, NY USA
  • Jordan Loyd
    Special Agent, Cyber Branch, Federal Bureau of Investigation, New York, NY USA
  • Bernard Matthews
    School of Law, Fordham University, New York, NY USA
  • Kevin Munnelly
    Office of the University Provost, Fordham University, New York, NY USA
  • Albert Murray
    Special Agent, Cyber Branch, Federal Bureau of Investigation, New York, NY USA
  • Jennifer Mussi Nolan
    Office of the University Secretary, Fordham University, New York, NY USA
  • Darrin Neely
    School of Law, Fordham University, New York, NY USA
  • Jonathan Perlstein
    Special Agent, Federal Bureau of Investigation
  • Noreen Rafferty Fernandez
    Office of Marketing and Communications, Fordham University, New York, NY USA
  • Gregory Rivas
    Intercampus Transportation, Fordham University, New York, NY USA
  • Sam Shahrani
    Special Agent, Cyber Branch, Federal Bureau of Investigation, New York, NY USA
  • Kate Spencer
    Office of Marketing and Communications, Fordham University, New York, NY USA
  • Paul Thyagaraj
    Office of Facilities Operations, Fordham University, New York, NY USA
  • Maureen P. Topf
    Office of the University Secretary, Fordham University, New York, NY USA
  • Gina Vergel
    Office of Marketing and Communications, Fordham University, New York, NY USA
  • Richard Waite
    Office of Conference Services, Fordham University, New York, NY USA
  • Joann Wallace
    Office of the Senior Vice President and Chief Financial Officer
  • David Youssef
    Department of Computer and Information Science, Fordham University, New York, NY USA
  • Melissa Zachariades
    Special Agent, Cyber Branch, Federal Bureau of Investigation, New York, NY USA

2013 Program & Schedule

The Academy:  International Cyber Security Academy (ICSA)

Saturday, August 3, 2013
  • 8:00am – 9:00am
    • Registration Opens for the International Cyber Security Academy (ICSA)
      • Lowenstein Center Lobby
  • 9:00am – 5:00pm
    • Enterprise Incident Response, by Mandiant
    • Cyber Security & Applications
    • Forensic Computing
    • Leadership & Management in Cyber Security
      • Lowenstein Center, 3rd Floor
  • 5:00pm – 7:00pm
    • Networking Cocktail Reception
      • Lowenstein Center, 12th Floor
Sunday, August 4, 2013
  • 9:00am – 5:00pm
    • Enterprise Incident Response, by Mandiant
    • Cyber Security & Applications
    • Forensic Computing
    • Leadership & Management in Cyber Security
      • Lowenstein Center, 3rd Floor
  • 6:00pm – 9:00pm
    • 3-Way Handshake Dinner Reception
      • Lowenstein Center, 12th Floor

The Briefings:  International Conference on Cyber Security (ICCS)

Monday, August 5, 2013
  • 8:00am – 1:00pm
    • (ISC)2® Half Day CSSLP® Credential Clinic
      • Lowenstein Center, 3rd Floor
  • 10:00am – 1:00pm
    • ​Registration Opens:
      • ​Law Enforcement Workshop (LEW)
      • Cyber Security Tutorial (CST)
        • Lowenstein Center Lobby
  • 1:00pm – 8:00pm
    • Registration Opens:
      • The International Conference on Cyber Security (ICCS)
        • Lowenstein Center Lobby
  • 1:00pm – 4:00pm
    • Law Enforcement Workshop (LEW)
      • McNally Amphitheatre
  • 1:00pm – 4:00pm
    • Cyber Security Tutorial (CST)
      • Law School, Room 205
  • 4:00pm – 8:00pm
    • Kick-Off & Welcoming Cocktail Reception
      • Lowenstein Center, 12th-floor
Tuesday, August 6, 2013
  • 8:00am – 5:00pm
    • Registration Continues:
      • International Conference on Cyber Security (ICCS)
        • Lowenstein Center Lobby
    • Sponsor Exhibits / Coffee / Water / Snacks / General Information
      • ​Law School Garden Level
  • 8:00am – 9:00am
    • Continental Breakfast
      • ​Law School Garden Level
  • 9:30am – 10:15am
    • Opening Ceremony | Director James R. Clapper
      • McNally Amphitheatre
  • 10:15am – 10:45am
    • Edward M. Stroz | Carl S. Young
      • McNally Amphitheatre
  • 10:45am – 11:00am
    • Coffee Break
      • ​Law School Garden Level
  • 11:00am – 11:30am
    • Bruce Mags
      • McNally Amphitheatre
  • 11:30am – 12:00pm
    • Gary Gagnon
      • McNally Amphitheatre
  • 12:00pm (Noon) – 1:30pm
    • Lunch
      • Pope Auditorium
  • 1:30pm – 2:00pm
    • Hira Agrawal
      • Law School Room 203
    • Stephen R. Flatley
      • Law School Room 205
    • Michael Pozmantier
      • Law School Room 311
    • Marisa Viveros
      • Law School Room 312
  • ​2:00pm – 2:05pm
    • BREAK
  • 2:05pm – 2:35pm
    • Merike Kaeo
      • Law School Room 203
    • Mauro Vignati
      • Law School Room 205
    • Sean Barnum
      • Law School Room 311
    • Frank J. Stech | Kristin E. Heckman
      • Law School Room 312
  • 2:35pm – 3:00pm
    • Coffee Break
      • ​Law School Garden Level
  • 3:00pm – 3:30pm
    • Rich Baich
      • McNally Amphitheatre
  • 3:30pm – 4:00pm
    • John N. Stewart
      • McNally Amphitheatre
  • ​​4:00pm – 5:30pm
    • Distinguished Panel 
      • McNally Amphitheatre
  • 5:30pm – 7:30pm
    • Taste of New York, Outdoor Reception
      • ​Lowenstein Plaza
Wednesday, August 7, 2013
  • 8:00am – 5:00pm
    • Registration Continues:
      • International Conference on Cyber Security (ICCS)
        • Lowenstein Center Lobby
    • Sponsor Exhibits / Coffee / Water / Snacks / General Information
      • ​Law School Garden Level
  • 8:00am – 9:00am
    • Continental Breakfast
      • ​Law School Garden Level
  • 9:00am – 10:00am
    • Keynote Address | George O. Strawn, Ph.D.
      • McNally Amphitheatre
  • 9:45am – 10:15am
    • Distinguished Address | Jared Cohen
      • McNally Amphitheatre
  • 10:15am – 10:30am
    • COFFEE BREAK
      • ​Law School Garden Level
  • 10:30am – 11:00am
    • Andras R. Szakal
      • McNally Amphitheatre
  • 11:00am – 11:30pm
    • Melissa Hathaway
      • McNally Amphitheatre
  • 11:30am – Noon
    • Sandra Stanar-Johnson
      • McNally Amphitheatre
  • 12:00pm (Noon) – 1:30pm
    • Lunch
      • ​Pope Auditorium
  • 1:30pm – 2:00pm
    • Jonathan Perlstein | Katie Scott
      • Law School Room 203
    • Anthony Vigilante
      • Law School Room 205
    • Matthew McCabe | Gus Coldebella | Adam Sedgewick
      • Law School Room 311
    • Andre Dornbusch
      • Law School Room 312
  • ​​2:00pm – 2:05pm
    • BREAK
  • 2:05pm – 2:35pm
    • Lulzsec
      • Law School Room 203
    • S.S. Iyengar, Ph.D
      • Law School Room 205
    • Eddie Cogan
      • Law School Room 311
    • Natalie Runyon
      • Law School Room 312
  • 2:35pm – 3:00pm
    • COFFEE BREAK
      • ​Law School Garden Level
  • 3:00pm – 3:30pm
    • Martin Libicki
      • McNally Amphitheatre
  • ​​3:30pm – 4:00pm
    • Tony Spinelli
      • McNally Amphitheatre
  • ​​4:00pm – 5:30pm
    • Panel
      • McNally Amphitheatre
  • 5:30pm – 7:30pm
    • Reception 
    • 12th Floor Lounge
      • E. Gerald Corrigan Conference Center, Lowenstein Center
Thursday, August 8, 2013
  • 8:00am – 5:00pm
    • Registration Continues:
      • International Conference on Cyber Security (ICCS)
        • Lowenstein Center Lobby
    • Sponsor Exhibits / Coffee / Water / Snacks / General Information
      • ​Law School Garden Level
  • 8:00am – 9:00am
    • Continental Breakfast
      • ​Law School Garden Level
  • 9:00am – 9:45am
    • Ruby B. Lee, Ph.D.
      • ​McNally Amphitheatre
  • 9:45am – 10:15am
    • Petros Mouchtaris
      • McNally Amphitheatre
  • 10:15am – 10:30am
    • Coffee Break
      • ​​​Law School Garden Level
  • 10:30am – 11:00am
    • David Knox
      • McNally Amphitheatre
  • 11:00am – 11:30pm
    • Jeffrey Voas
      • McNally Amphitheatre
  • 11:30am – Noon
    • Distinguished Address | Robert E. Joyce | Ian Levy
      • McNally Amphitheatre
  • Noon – 1:30pm
    • Lunch
      • Pope Auditorium
  • ​​1:30pm – 4:00pm
    • Special Keynote Roundtable
      • General Keith B. Alexander
      • Director Robert S. Mueller III
      • Session Chair: George Venizelos
      • Moderator: Joseph M. McShane, S.J, 
        • McNally Amphitheatre
  • ​​​4:15pm – 5:00pm
    • Transportation to Gracie Mansion
  • 5:00pm – 7:00pm
    • Special Bar-B-Que Reception at Gracie Mansion, Official Residence of the Mayor of the City of New York
       
Keynote and Distinguished Speakers
  • Gen. Keith B. Alexander
    Director
    National Security Agency Commander, CYBERCOM
  • Preet Bharara
    United States Attorney
    Southern District of New York, United States Department of Justice, New York, NY USA
  • Michael Chertoff
    Former Secretary
    United States Department of Homeland Security, Washington, DC USA
  • Jared Cohen
    Founder and Director
    Google Ideas, New York, NY
  • Joseph M. Demarest
    Assistant Director
    Cyber Division, Federal Bureau of Investigation, Washington, DC USA
  • Ruby B. Lee, Ph.D.
    Forrest G. Hamrick Professor of Electrical Engineering and Computer Science
    Princeton University, Princeton, NJ USA
  • Ian Levy
    Technical Director
    United Kingdom's Government Communications Headquarters, Cheltenham, Gloucestershire UK
  • Kevin Mandia
    Chief Executive Officer
    Mandiant, Washington, DC USA
  • Lisa Monaco
    Assistant to the President for Homeland Security and Counterterrorism, Deputy National Security Advisor
    The White House, Washington, DC USA
  • Robert S. Mueller
    Director, Federal Bureau of Investigation
    Washington, DC USA
  • George O. Strawn
    Director, Networking and Information Technology Research and Development Program
    National Coordination Office, Washington, DC USA
Plenary and Parallel Speakers
  • Hira Agrawal
    Senior Scientist
    Applied Communications Systems
  • Rich Baich
    Executive Vice President, Chief Information Security Officer
    Wells Fargo, Charlotte, NC USA
  • Sean Barnum
    Security Principal
    The MITRE Corporation, McLean, VA USA
  • Elisa Bertino
    Professor of Computer Science
    Purdue University
  • Richard Carback
    Principal Researcher and Security Engineer
    Charles Stark Draper Laboratories
  • Robin DeStefano
    Co-Lead
    Comprehensive National Cybersecurity Initiative Five (CNCI-5)
  • Andre Dornbusch
    Federal Criminal Police Office (Bundeskriminalamt)
    Wiesbaden, Hesse DEU
  • Stephen R. Flatley
    Senior Examiner
    Computer Analysis Response Team, Federal Bureau of Investigation, New York, NY USA
  • Gary J. Gagnon
    Senior Vice President and Chief Security Officer
    The MITRE Corporation, McLean, VA USA
  • Melissa Hathaway
    Hathaway Global Strategies, Washington, DC USA
  • Kristin Heckman, D. Sc.
    Lead Scientist
    The MITRE Corporation, McLean, VA USA
  • S.S. Iyengar
    Director of Research
    NuLogix
  • Merike Kaeo
    Security Evangelist
    IID
  • David Knox
    Vice President, National Security Group
    Oracle, Redwood City, CA USA
  • Martin Libicki, Ph.D.
    Senior Management Scientist
    RAND Corporation, Santa Monica, CA USA
  • Bruce Maggs, Ph.D.
    Professor of Computer Science, Duke University, Durham, NC USA and
    Vice President for Research, Akamai Technologies, Cambridge, MA USA
  • Matthew McCabe
    Senior Vice President
    Marsh
  • Petros Mouchtaris, Ph, D.
    Chief Operating Officer
    Applied Communications Science, Basking Ridge, NJ USA
  • Jonathan Perlstein
    Special Agent
    Federal Bureau of Investigation
  • Natalie Runyon
    Chief Security Officer
    Thomson Reuters, New York, NY USA
  • Marek Rusinkiewicz, Ph.D.
    Professor of Computer Science
    Florida International University, University Park, FL USA
  • Kathryn Scott
    Special Agent
    Federal Bureau of Investigation
  • Antonio Scurlock
    Co-Lead
    Comprehensive National Cybersecurity Initiative Five (CNCI-5)
  • Shane Snyder
    Computer Engineer
    U.S. Army CERDEC
  • Tony Spinelli
    Senior Vice President and Chief Security Officer
    Equifax, Atlanta, GA USA
  • Sandra Stanar-Johnson
    NSA/CSS Representative 
    Department of Homeland Security
  • Frank Stech, Ph. D.
    Principal Investigator, Research Projects
    The MITRE Corporation, McLean, VA USA
  • John Stewart
    Senior Vice President, Chief Security Officer, Global Government and Corporate Security
    Cisco Systems, Inc., San Jose, CA USA
  • Edward M. Stroz
    Co-President
    Stroz Friedberg, New York, NY USA
  • Andras Szakal
    Vice President and Chief Technology Officer
    IBM, Armonk, NY USA
  • Emily Vacher
    Manager, Trust and Safety
    Facebook, Menlo Park, CA USA
  • Anthony Vigilante
    Managing Director and Chief of Technology
    MacKay Shields, New York, NY USA
  • Mauro Vignati
    Reporting and Analysis Centre for Information Assurance MELANI
    Schwarztorstrasse, Bern CHE
  • Marisa Viveros
    Vice President, Cyber Security Innovation
    IBM

 

International Cyber Security Academy

Preparing the Front Lines for Tomorrow's Cyber Threats

The International Cyber Security Academy (ICSA) is a specialized series of hands-on training seminars and lectures to teach cyber warriors the most cutting edge tools, techniques, and protocols (TTPs) of information security beyond mere concepts and terminology. ICSA is ideal for professionals in security and other related fields who want industry leading knowledge on creating a defensible network, maintaining systems targeted by adversaries, effectively deploying information security tools, and tracking cyber criminals.

Attendees will partake in classroom style lectures and laboratory research, learning how to develop, install, and configure the tools needed for comprehensive security in a hands-on environment.  After learning the specialized tools, techniques, and protocols, the cyber warriors will be tested in training scenarios.  These training sessions will simulate real-world scenarios faced by front-line security professionals and cyber investigators every day, allowing cyber warriors to utilize the learned TTPs in real time on the wire. Professionals in other fields will gain from cross-disciplinary teachings at the Academy, helping them understand and apply the nuanced technical details of cyber security to work in their prospective fields.

Cyber warriors attending ICSA join the ranks of the privileged few, the Society of Few, Protectors of Many, who receive training on the skills and techniques needed to combat emerging cyber threats and exploitations from leading U.S. government professionals and private industry leaders. The hands-on approach to learning in the Academy, in conjunction with the complimentary admittance to the International Conference on Cyber Security (ICCS) and all of its lectures, will prepare the future leaders of secure and sustainable cyberspace.  Please click here to view the Official ICSA Program & Schedule.

August 2013 ICSA Training Seminars

  • Enterprise Incident Response, by Mandiant  (Saturday, August 3 & Sunday, August 4 + ICCS; $2,350)
    • The International Cyber Security Academy (ICSA), the pre-eminent cyber security academy, and Mandiant have partnered to provide industry leading training on Enterprise Incident Response.  Cyber warriors will pair with expert Mandiant trainers to learn how to identify, triage, quarantine, and investigate complex cyber security incidents through case studies and unique hands-on lab exercises.  This course will cover the incident response process, containment, forensic collection and imaging, analysis of volatile and nonvolatile data, identifying persistence mechanisms, and more.  Register Now!
        • Who Should Attend
          • Anyone involved in the information technology and information security fields responsible for responding to computer intrusions or securing corporate networks.  The training covers the basics of the incident response process and proper handling of incidents as well as investigative techniques.
          • Security Professionals and Management who want to understand and deploy complex information security tools, techniques and protocols beyond basic levels.
          • Security Professionals and Management who want to learn how to deploy complex information security tools, techniques and protocols in an industry-leading training laboratory.
          • Engineers and Management who need a high level understanding of what is involved in operating a defensible network that is facing attacks.
          • Networking, Forensic, Penetration Testers, and Security Auditors who need more nuanced understanding of network and information security principles so they can be more effective at their jobs.
          • Security Professionals and Management responsible for building and maintaining systems that are being targeted by complex malicious actors.
          • Attorneys and Legal Professionals in need of a pragmatic understanding of computer and networking technologies and their high level functions.
          • Anyone new to information security with a strong background in information systems and networking.
        • Laptop Requirements
          • Attendees are required to bring their own properly configured laptops to the training seminar.
          • You must be running Windows 7.
          • You must have Administrator access to the laptop.
          • You must remove all anti-virus applications.
          • You must remove all personal firewall applications.
          • You must have a wired ethernet connection
          • You must have VMWare’s VMWare Workstation installed and functioning.
          • You must be familiar with command line utilities in Windows, navigating the Windows file system using the command line.
          • You must be familiar with common file system structures, Windows Registry.
          • You must have a fundamental understanding of basic information and network security concepts and protocols.
        • Laptop Recommendations
          • Use discretion with what computer you bring to ICSA (ie, personal computers or company production computers are not recommended).  With the research and training in advanced tools, techniques and protocols, there is always the risk of data loss and corruption of your operating system.
  • (ISC)2® Half Day CSSLP® Credential Clinic  (Monday, August 5 + ICCS; $1,500)
    • The International Cyber Security Academy (ICSA), the pre-eminent cyber security academy, and (ISC)2® have partnered to provide industry leading training on the software development lifecycle. Software must be developed with security in mind in order to defend and mitigate hackers. We all know this is critical but now is the time to ensure it happens. In this clinic, we will cover two of the eight domains from the CSSLP certification that ensures that security is considered for each phase of the software lifecycle. The CSSLP is for everyone involved in the SDLC with at least 4 years' experience.  Register Now!
        • Who Should Attend
          • Each software lifecycle stakeholder is responsible for certain phase(s) of the SDLC, but all phases must have security built into them. CSSLP is for all the stakeholders involved in the process. Each of the 7 CSSLP Domains covers how to build security into the different phases. Don’t have the experience? Become an Associate of (ISC)² by successfully passing the CSSLP CBT exam. You’ll have 5 years to earn your experience to become a CSSLP.
        • Laptop Requirements
          • There are no laptop requirements for this offering.
        • ​Professional Continuing Education (CPE) Credits
          • ​4 CPE credits are available upon successful completetion.
  • Cyber Security & Applications¹  (Saturday, August 3 & Sunday, August 4 + ICCS; $3,350)
    • This course provides a comprehensive and cross-disciplinary perspective on the ways and means to build a secure and sustainable cyberspace ecosystem.  Topics are drawn from a variety of areas in emerging technologies, operation and enforcement, and real life experiences. Applications include projects and case studies, expert lectures and discussions with cyber security leaders from public and private sectors.  Register Now!
        • Who Should Attend
          • Security Professionals and Management who want to receive hands-on real-world experience in a research and development environment.
          • Attorneys and Legal Professionals needing a hands-on and real-world understanding of computer and networking technologies and their functions.
          • Security professionals and Management who want to understand and deploy information security tools, techniques and protocols beyond basic understanding.
          • Engineers and Management needing to understand what is involved and how to function a defensible network against attacks.
            Networking, Forensic, Penetration Testers, and Security Auditors who need a solid foundational of security principles so they can be effective at their jobs.
          • Security Professionals and Management responsible for building and maintaining systems that are being targeted by adversaries.
          • Anyone new to information security with beginners background in information systems and networking.
        • Laptop Requirements
          • Attendees are required to bring their own properly configured laptops to the training seminar.
          • You must be running Windows 7.
          • You must have Administrator access to the laptop.
          • You must remove all anti-virus applications.
          • You must have a wired ethernet connection
          • You must remove all personal firewall applications.
          • You must have VMWare’s, VMWare Workstation installed and functioning.
        • Laptop Recommendations
          • Use discretion with what computer you bring to ICSA (ie, personal computers or company production computers are not recommended).  With the research and development of tools, techniques and protocols, there is always the risk of data loss and corruption of your operating system.
  • Forensic Computing¹  (Saturday, August 3 & Sunday, August 4 + ICCS; $3,350)
    • Computing and digital technology has transformed society and the way we live.  Today, our world is filled with an array of complex multi-processing and interconnected machines that we have all become accustomed to.  This course studies technologies and practices for investigating the use, misuse and the adversarial potential of computing systems and digital devices.  It will provide insight into the digital forensics and legal world, emphasized with practical lab projects.  Register Now!
        • Who Should Attend
          • Security Professionals and Management who want to receive hands-on real-world experience in a research and development environment.
          • Security professionals and Management who want to understand and deploy information security tools, techniques and protocols beyond basic understanding.
          • Engineers and Management needing to understand what is involved and how to function a defensible network against attacks.
            Networking, Forensic, Penetration Testers, and Security Auditors who need a solid foundational of security principles so they can be effective at their jobs.
          • Security Professionals and Management responsible for building and maintaining systems that are being targeted by adversaries.
          • Anyone new to information security with beginners background in information systems and networking.
        • Laptop Requirements
          • Attendees are required to bring their own properly configured laptops to the training seminar.
          • You must be running Windows 7.
          • You must have Administrator access to the laptop.
          • You must remove all anti-virus applications.
          • You must have a wired ethernet connection
          • You must remove all personal firewall applications.
          • You must have VMWare’s, VMWare Workstation installed and functioning.
        • Laptop Recommendations
          • Use discretion with what computer you bring to ICSA (ie, personal computers or company production computers are not recommended).  With the research and development of tools, techniques and protocols, there is always the risk of data loss and corruption of your operating system.
        • ​Additional Requirements
          • ​2 GB Thumb Drive
          • Blank CD, on which to create a Boot CD
  • Leadership & Management in Cyber Security  (Saturday, August 3 & Sunday, August 4 + ICCS; $3,350)
    • In the interconnected world of combined cyber-physical-natural cyberspace, big data can be an asset but also a liability for individuals and organizations.  This course covers a variety of issues (including technological, economical, business, legal and ethical) to manage cyber risk for individual citizens, government organizations, and business enterprises.  Students will meet and work with global leaders in cyber security on projects related to best practices derived from experiences in the field.  Register Now!
        • Who Should Attend
          • Security Management who want to understand information security tools, techniques and protocols beyond basic understanding.
          • Management needing to understand what is involved and how to function a defensible network against attacks.
          • Management involved with the networking, forensic, penetration testers, and security auditors who need a solid foundational of security principles so they can be effective at their jobs.
          • Management responsible for building and maintaining systems that are being targeted by adversaries.
  • (ISC)2® CISSP CBK Review Seminar  (Monday, August 5  – Friday, August 9 + ICCS Networking Events; $1,800)
    • The Official CISSP® CBK® Review Seminar is the key to success in obtaining your certification as a Certified Information Systems Security Professional. CISSP® certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Prepared by CISSP credential holders and conducted by (ISC)² authorized instructors, the (ISC)² CISSP CBK Review Seminar is the most comprehensive review of information systems security concepts and industry best practices.  Register Now!
        • What You Will Learn
          • Access Control: a collection of mechanisms that work together to create security architecture to protect the assets of the information system.
          • Telecommunications and Network Security: network structures, transmission methods, transport formats and security measures used to provide availability, integrity, and confidentiality.
          • Information Security Governance and Risk Management: the identification of an organization's information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines.
          • Software Development Security: the controls that are included within systems and applications software and the steps used in their development.
          • Cryptography: the principles, means, and methods of disguising information to ensure its integrity, confidentiality, and authenticity.
          • Security Architecture and Design: the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability.
          • Operations Security: the controls over hardware, media, and the operators with access privileges to any of these resources. Business Continuity and Disaster Recovery Planning: steps to preserve the business in the face of major disruptions to normal business operations.
          • Legal, Regulations, Investigations, and Compliance: computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence. Physical (Environmental) Security: the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information.
        • This exclusive seminar will help you identify areas of the CISSP CBK you need to study and features:
          • 100% up-to-date material;
          • An overview of the information security field;
          • Contributions from CISSPs, (ISC)² Authorized Instructors and subject matter experts; and
          • End-of-domain review questions

August 2013 ICSA Networking Opportunities

  • 3-Way Handshake Dinner Reception  (Sunday, August 4; 6:00pm – 9:00pm; $0.00)
    • Following your arduous training at the International Cyber Security Academy, join your fellow cyber warriors for a relaxing evening meal and cocktails at the 3-Way Handshake Dinner. This is a chance to organize future operations in cyber security together with one another, network professionally, and enjoy learning more about those who have trained beside you at the Academy.  On August 4, 2013 dinner and cocktails will be held from 6:00 pm to 9:00 pm with business formal attire encouraged for attendees. Additionally, all are encouraged to bring items from their organization such as challenge coins, pins, patches or hats to share with your fellow Academy trainees who have joined you in the Society of Few, Protectors of Many.
        • Please note, the 3-Way Handshake Dinner is part of the ICSA Program and all attendees are encouraged to attend.  The cost of the 3-Way Handshake Dinner is included with registration.

Educational Partners

(ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with nearly 90,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSPÒ) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLPÒ), Certified Authorization Professional (CAPÒ), and Systems Security Certified Practitioner (SSCPÒ) credentials to qualifying candidates. (ISC)²’s certifications are among the first information technology credentials to meet the requirements of ISO/IEC Standard 17024. (ISC)² offers education programs and services based on its CBK®, a compendium of information security topics. Visit www.isc2.org.

 

Mandiant is the leader in advanced threat detection and response solutions.  Headquartered in Alexandria, Virginia, with offices in New York, Los Angeles, San Francisco and Reston, Virginia, Mandiant provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and the world’s leading law firms.  The authors of 12 books and quoted frequently by leading media organizations, Mandiant security consultants and engineers hold top government security clearances and certifications and advanced degrees from some of the most prestigious computer science universities.  To learn more about Mandiant visit www.mandiant.com, read the company blog, M-unition™ http://blog.mandiant.com, follow on Twitter @Mandiant or Facebook at www.facebook.com/mandiantcorp.

Yellow Ribbon Program

The International Cyber Security Academy Salutes You!  Through the Yellow Ribbon Program, current Fordham University qualified veterans can attend the International Cyber Security Academy at Fordham University. At ICSA, Fordham University veterans can learn the coveted skills needed in the emerging field of cyber security amongst leading government and private industry professionals. Fordham University guarantees that all ICSA fees are fully covered for current Fordham University admitted veterans who fall in the Veteran Affairs’ maximum benefit category. Veterans who attend ICSA will be future leaders on the frontlines of cyber security.²  For more information, please visit the FordhamVets website (link).  Not enrolled at Fordham University yet?  Start the process now (link)!

 

¹If desired, taking these hands-on training seminars will entitle the attendee to three Fordham University credits.  Special instructions will be communicated once the attendee is successfully registered for the seminar.

²At this time, the Yellow Ribbon Program is only available for the Cyber Security & Applications and Forensic Computing hands-on training seminars.